Analysis
-
max time kernel
149s -
max time network
152s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
11-12-2024 20:51
Behavioral task
behavioral1
Sample
x86.elf
Resource
ubuntu1804-amd64-20240611-en
ubuntu-18.04-amd64
7 signatures
150 seconds
General
-
Target
x86.elf
-
Size
28KB
-
MD5
54d07ade0004f03aaca028523d8f3eb6
-
SHA1
73606fc68439ea7ceb148f94d61dbe0235da8355
-
SHA256
d1270e8be4de4713834930df984a515448ca8dd0acc7b0e03e5aa7fc4428882b
-
SHA512
43ce9c67151734e6e907a4bf30c06e41b52d524c388273380506b604ce3fed2779ef057b282737b1e05c11055611a4bd0559567253fb1b0f3309114e20eadf4b
-
SSDEEP
384:MHAA8X5tiap3aMg31SOTkCN9/zER2BUxG6g0P97/KNTu+AKfekvUyvICkzvDeSwK:X0asSl4hzzBb6PP97CNNeksyv39t9E
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
BOTNET
Signatures
-
Mirai family
-
Contacts a large (111821) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog x86.elf File opened for modification /dev/misc/watchdog x86.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 1478 x86.elf -
description ioc Process File opened for reading /proc/ x86.elf