Analysis
-
max time kernel
145s -
max time network
146s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240729-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
29-11-2024 03:28
Behavioral task
behavioral1
Sample
6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b.elf
Resource
ubuntu2204-amd64-20240729-en
General
-
Target
6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b.elf
-
Size
113KB
-
MD5
047030c9d649859a053f6aa16a124c91
-
SHA1
39cb075782f34e9ea69ac864080661546fd81a2d
-
SHA256
6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b
-
SHA512
7edf36d6398ea0ca07094e3603c412b3a4d95bd1eb27aba38b6172c9118c7bb0265c19d10084c47199f300b286c4312066e48f3274f084a6ad9cab869c009bfb
-
SSDEEP
3072:kiry859a2ADJf9wHYqbgFFo8+HeAt+TRCm7FnVqfJXFWbNb:T9a2aLqkrMgsm7FnVqfJXFWbNb
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b.elf File opened for modification /dev/misc/watchdog 6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 1571 6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 6f299565151e872c9d55151d0265c1845b2e5c9a02fb3c2c8d44559ed1b0e86b.elf