Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240508-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240508-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
16-12-2024 02:10
Behavioral task
behavioral1
Sample
3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf
Resource
ubuntu1804-amd64-20240508-en
General
-
Target
3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf
-
Size
75KB
-
MD5
c70d6d70685235b94fed5ec73aed3b2c
-
SHA1
cc9ebae95a7c15a670388fc44e0fd41547c17e18
-
SHA256
3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e
-
SHA512
e3fb2b71ad3a106724355eeae05f20f483ebd5c78e36d93c2a2ad7137bb6fd95b3c79d916322a99b2819c07ee00bc132cf1bad1735edc3a02e4144dd5c408954
-
SSDEEP
1536:dvBGpSzKkubpUa2jecqCR/JYHqDIw+e6+MFOPRkTZRbXXTzpwbZnR+5:hcpHblUaBcPNeHqEw36FOPOZRTXTNwbf
Malware Config
Signatures
-
Contacts a large (23999) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1501 chmod 1497 sh -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local 3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/watchdog 1496 3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/watchdog sh
Processes
-
/tmp/3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf/tmp/3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf1⤵
- Modifies rc script
- Changes its process name
PID:1496 -
/bin/shsh -c "rm -rf bin/watchdog && mkdir bin; >bin/watchdog && mv /tmp/3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf bin/watchdog; chmod 777 bin/watchdog"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:1497 -
/bin/rmrm -rf bin/watchdog3⤵PID:1498
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:1499
-
-
/bin/mvmv /tmp/3231a0ef57c7107fefb310e12f4d2994fc9d0afd9c76148ce1cd409d5cb5dd7e.elf bin/watchdog3⤵
- Reads runtime system information
PID:1500
-
-
/bin/chmodchmod 777 bin/watchdog3⤵
- File and Directory Permissions Modification
PID:1501
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95B
MD5ea1dfdca9880b1a10b7368aa0dfe2aef
SHA1b945ec5d90fc07016b606cc10651203d058bfe88
SHA256fb51f4b2f2f0c8eadb95244b3a602d1355de8e4d578375dd7736effa1501fb1a
SHA5123a4fc8238729102268cff2a88f7ce0d3424a0739a94feb33b725d2f54dca8659427c9f393a1782f16a06e752bfca4e98e761427bb7ef90f4fbfeacbedd0b7b47