Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240522.1-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240522.1-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    18-12-2024 12:51

General

  • Target

    loligang.x86.elf

  • Size

    64KB

  • MD5

    953ad20f4b1242ad0b141152fb0cc3db

  • SHA1

    a5923e1acb45f85e8ac4bf72c059551dee461ed5

  • SHA256

    f148ef3515d7cf4dce720b4abf4c3e15b83bfaee58cf387a4c25a0850ac10de0

  • SHA512

    6c83fb32015b0c0f2de4275aa0d575152bde8f072c5a955e2e1cf7b9556c21a182722fae6593d17f09104a93536fcd9f84bf90104c56f06b0cbb75c3bc5ecab0

  • SSDEEP

    1536:IIG9170vwHbQXZ5+qXDEuXi9aBSW7V/DjObeFt6PuQ4Z6:I917iwHbQXZ5+qXA59eSWZ/XObeb6GZZ

Malware Config

Signatures

  • Contacts a large (20712) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/loligang.x86.elf
    /tmp/loligang.x86.elf
    1⤵
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Reads system network configuration
    • Reads runtime system information
    PID:1569

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads