Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
14-12-2024 03:17
Behavioral task
behavioral1
Sample
4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf
-
Size
72KB
-
MD5
5a7d6baa6e0ec7fe3e4b8d70f7c97598
-
SHA1
5e320db909d429468d2ca012b7128a121272791b
-
SHA256
4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2
-
SHA512
b1527d6be58151dde7137d71dbd027827d466dc53089166fd5c13b93bf301aeaa86ea84a23b372b2e874d0e0c30459bffc9229dc83cda1f32c732032716f7666
-
SSDEEP
1536:cGzNBMNqLIwpZnrjgOSu9RjO1xIS6VTMEEHa3B1b35AYwbZnp:xNegUAnjLRjOnIS6uEEeB1D5AYwbZnp
Malware Config
Signatures
-
Contacts a large (23832) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 2479 sh 2483 chmod -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local 4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 2477 4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf/tmp/4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf1⤵
- Modifies rc script
- Changes its process name
PID:2477 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:2479 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:2480
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:2481
-
-
/usr/bin/mvmv /tmp/4a4d2cb9f318d3b31c134d7ddff8b0d02b00b023a8079d064c177bb7e760f9b2.elf bin/busybox3⤵
- Reads runtime system information
PID:2482
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:2483
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1