Analysis
-
max time kernel
135s -
max time network
154s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
10-12-2024 17:12
Behavioral task
behavioral1
Sample
.5r3fqt67ew531has4231.x86.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
.5r3fqt67ew531has4231.x86.elf
-
Size
230KB
-
MD5
f3bde1f4aaceda824ee6f0817d63a06b
-
SHA1
487232a8fd1c42efa68f31fbc2cc057adbe052b7
-
SHA256
c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082
-
SHA512
a1656ef2a2768466629b8956bab42f70797f431a20bc251b07e2390c71a46690fb98134c35f69ad8274e3c21d1e9da1dabc05774a9b33dbfef60f6bbb5bda83d
-
SSDEEP
3072:RXtfaFtWuxyW7A03vfdbV10kzZpPJKxU4n9zlMzG4QDsOG7rHkvWQwbZnUz:baKuxyW7ACvfdbfZpkx16+RWQwRU
Malware Config
Signatures
-
Contacts a large (133571) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 4068 sh 4072 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog .5r3fqt67ew531has4231.x86.elf File opened for modification /dev/misc/watchdog .5r3fqt67ew531has4231.x86.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 4066 .5r3fqt67ew531has4231.x86.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps .5r3fqt67ew531has4231.x86.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/.5r3fqt67ew531has4231.x86.elf/tmp/.5r3fqt67ew531has4231.x86.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:4066 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/.5r3fqt67ew531has4231.x86.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:4068 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:4069
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:4070
-
-
/usr/bin/mvmv /tmp/.5r3fqt67ew531has4231.x86.elf bin/busybox3⤵
- Reads runtime system information
PID:4071
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:4072
-
-