Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240729-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
31-12-2024 02:21
Behavioral task
behavioral1
Sample
44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf
Resource
ubuntu2404-amd64-20240729-en
General
-
Target
44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf
-
Size
119KB
-
MD5
df7bfd2e904ab2a3c3d306fe17c76d45
-
SHA1
dc086476bec32913944c133d6539f2a79a537dd0
-
SHA256
44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369
-
SHA512
803fae83fcebdf98c3ba3b2bfbb344d793436fac94a75059b89772bde46d9e596d8ab565655d25b5081b046d9a6b2c05ad595f5d80ca2400eb2ee1eec390d9ac
-
SSDEEP
3072:NGwFZYkgRucQX9LOVPxIgFWs+kM3TH9kboyuxaIaDcokxgNoDk8GNV:NvwYOnbG3aUgDcokxgNoDk8GNV
Malware Config
Signatures
-
Contacts a large (23995) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf File opened for modification /dev/misc/watchdog 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf -
Reads process memory 1 TTPs 1 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/403/maps 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 2499 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf -
description ioc Process File opened for reading /proc/2503/exe 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf File opened for reading /proc/400 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf File opened for reading /proc/401 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf File opened for reading /proc/402 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf File opened for reading /proc/403 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf File opened for reading /proc/403/exe 44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf
Processes
-
/tmp/44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf/tmp/44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369.elf1⤵
- Modifies Watchdog functionality
- Reads system routing table
- Reads process memory
- Changes its process name
- Reads system network configuration
- Reads runtime system information
PID:2499