Analysis
-
max time kernel
142s -
max time network
152s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
11-12-2024 03:24
Behavioral task
behavioral1
Sample
c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf
-
Size
230KB
-
MD5
f3bde1f4aaceda824ee6f0817d63a06b
-
SHA1
487232a8fd1c42efa68f31fbc2cc057adbe052b7
-
SHA256
c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082
-
SHA512
a1656ef2a2768466629b8956bab42f70797f431a20bc251b07e2390c71a46690fb98134c35f69ad8274e3c21d1e9da1dabc05774a9b33dbfef60f6bbb5bda83d
-
SSDEEP
3072:RXtfaFtWuxyW7A03vfdbV10kzZpPJKxU4n9zlMzG4QDsOG7rHkvWQwbZnUz:baKuxyW7ACvfdbfZpkx16+RWQwRU
Malware Config
Signatures
-
Contacts a large (130419) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 2842 sh 2846 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf File opened for modification /dev/watchdog c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 2840 c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf -
description ioc Process File opened for reading /proc/self/maps c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf/tmp/c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:2840 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:2842 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:2843
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:2844
-
-
/usr/bin/mvmv /tmp/c188ca874598c395a247f7e1e1a79203bb767339075fa1d51b47091c62939082.elf bin/busybox3⤵
- Reads runtime system information
PID:2845
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:2846
-
-