Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    29-11-2024 03:41

General

  • Target

    8adb6fddafc52fae16ef4a8f3b294d3d01836d98069039801d4e1b9220ea5176.elf

  • Size

    101KB

  • MD5

    657733c59bde74283f4c807205ad3982

  • SHA1

    ff06b5bdc7f11d97939a737aeaa50c1c31da4954

  • SHA256

    8adb6fddafc52fae16ef4a8f3b294d3d01836d98069039801d4e1b9220ea5176

  • SHA512

    b176001c9be13421e17dfbbfeb937acc8bab404429e3084bf83492a9c066187aa466ac244a3db46a81a192e5792fae02b7cc64366df915ef51080f2e56c1382b

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fPHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fPHmmFVcqq0GnDZT

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/8adb6fddafc52fae16ef4a8f3b294d3d01836d98069039801d4e1b9220ea5176.elf
    /tmp/8adb6fddafc52fae16ef4a8f3b294d3d01836d98069039801d4e1b9220ea5176.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:1589

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads