Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
03-01-2025 03:18
Behavioral task
behavioral1
Sample
0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf
Resource
ubuntu1804-amd64-20240611-en
General
-
Target
0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf
-
Size
79KB
-
MD5
793608dcc966f10f356cc0c84b68f618
-
SHA1
7042c74fc2ef1c8acdb11e020348d66b0c0a65ec
-
SHA256
0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237
-
SHA512
b49664b0cc0848ac96a1cc3d1a99e35e57158499b5b77f2c74d737eb39a1987ea33a198ab58f8a15ca6417f8a8c5003aff98464a9524d4f192e3d4674a7fb911
-
SSDEEP
1536:jEZ7dF3Nw8V/OjhJgpZqLKfFVb5/QR6qngwfR6eeiTzrcL1RPSnReSNESw3SVXF:jUdRa8VQHgp9FVSR60gw1XTza1RPS8SN
Malware Config
Signatures
-
description ioc Process File deleted /var/log/audit/audit.log 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf -
Deletes itself 1 IoCs
pid Process 1472 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf -
description ioc Process File deleted /var/log/journal/11c67417355f45d397f6be11f62e85a6/system.journal 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf -
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
description ioc Process File deleted /var/log/syslog 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf File opened for modification /dev/misc/watchdog 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /etc/systemd/system/startup_command.service 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself flfgdtwo7mtok6a1igtuofcl1pe7 1472 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf -
Reads CPU attributes 1 TTPs 10 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill -
description ioc Process File opened for reading /proc/1033/status pkill File opened for reading /proc/1143/status pkill File opened for reading /proc/10/status pkill File opened for reading /proc/79/status pkill File opened for reading /proc/442/status pkill File opened for reading /proc/249/status pkill File opened for reading /proc/531/cmdline pkill File opened for reading /proc/82/cmdline 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf File opened for reading /proc/160/cmdline 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf File opened for reading /proc/154/status pkill File opened for reading /proc/161/status pkill File opened for reading /proc/442/status pkill File opened for reading /proc/1125/status pkill File opened for reading /proc/1474/cmdline pkill File opened for reading /proc/18/status pkill File opened for reading /proc/129/cmdline pkill File opened for reading /proc/660/cmdline pkill File opened for reading /proc/1170/status pkill File opened for reading /proc/501/cmdline pkill File opened for reading /proc/531/status pkill File opened for reading /proc/952/status pkill File opened for reading /proc/1158/cmdline pkill File opened for reading /proc/1178/cmdline pkill File opened for reading /proc/1472/cmdline 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf File opened for reading /proc/24/status pkill File opened for reading /proc/700/status pkill File opened for reading /proc/1287/cmdline pkill File opened for reading /proc/1278/status pkill File opened for reading /proc/24/cmdline pkill File opened for reading /proc/164/status pkill File opened for reading /proc/156/cmdline pkill File opened for reading /proc/406/status pkill File opened for reading /proc/960/status pkill File opened for reading /proc/1287/status pkill File opened for reading /proc/12/status pkill File opened for reading /proc/154/status pkill File opened for reading /proc/938/cmdline pkill File opened for reading /proc/self/stat systemctl File opened for reading /proc/3/cmdline pkill File opened for reading /proc/325/status pkill File opened for reading /proc/460/status pkill File opened for reading /proc/1014/cmdline pkill File opened for reading /proc/157/cmdline 0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf File opened for reading /proc/79/cmdline pkill File opened for reading /proc/1176/status pkill File opened for reading /proc/1158/cmdline pkill File opened for reading /proc/1323/cmdline pkill File opened for reading /proc/1475/status pkill File opened for reading /proc/664/cmdline pkill File opened for reading /proc/1140/cmdline pkill File opened for reading /proc/700/status pkill File opened for reading /proc/1129/status pkill File opened for reading /proc/404/cmdline pkill File opened for reading /proc/476/status pkill File opened for reading /proc/115/status pkill File opened for reading /proc/594/status pkill File opened for reading /proc/664/cmdline pkill File opened for reading /proc/1143/status pkill File opened for reading /proc/1152/status pkill File opened for reading /proc/115/status pkill File opened for reading /proc/156/status pkill File opened for reading /proc/1467/status pkill File opened for reading /proc/11/status pkill File opened for reading /proc/1243/cmdline pkill
Processes
-
/tmp/0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf/tmp/0ede5fe6fc280fd897bfafe958262eae21f5e866aa7fbc0c74aaf4a3e9ec3237.elf1⤵
- Deletes Audit logs
- Deletes itself
- Deletes journal logs
- Deletes system logs
- Modifies Watchdog functionality
- Modifies systemd
- Changes its process name
- Reads runtime system information
PID:1472 -
/usr/local/sbin/pkillpkill ettercap2⤵PID:1478
-
-
/usr/local/bin/pkillpkill ettercap2⤵PID:1478
-
-
/usr/sbin/pkillpkill ettercap2⤵PID:1478
-
-
/usr/bin/pkillpkill ettercap2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1478
-
-
/usr/local/sbin/pkillpkill dsniff2⤵PID:1479
-
-
/usr/local/bin/pkillpkill dsniff2⤵PID:1479
-
-
/usr/sbin/pkillpkill dsniff2⤵PID:1479
-
-
/usr/bin/pkillpkill dsniff2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1479
-
-
/usr/local/sbin/pkillpkill dumpcap2⤵PID:1477
-
-
/usr/local/sbin/pkillpkill wireshark2⤵PID:1476
-
-
/usr/local/sbin/pkillpkill ngrep2⤵PID:1480
-
-
/usr/local/sbin/pkillpkill tcpflow2⤵PID:1481
-
-
/usr/local/bin/pkillpkill dumpcap2⤵PID:1477
-
-
/usr/local/bin/pkillpkill ngrep2⤵PID:1480
-
-
/usr/local/bin/pkillpkill wireshark2⤵PID:1476
-
-
/usr/sbin/pkillpkill dumpcap2⤵PID:1477
-
-
/usr/sbin/pkillpkill wireshark2⤵PID:1476
-
-
/usr/sbin/pkillpkill ngrep2⤵PID:1480
-
-
/usr/local/sbin/pkillpkill tshark2⤵PID:1475
-
-
/usr/local/bin/pkillpkill tcpflow2⤵PID:1481
-
-
/usr/bin/pkillpkill dumpcap2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1477
-
-
/usr/bin/pkillpkill wireshark2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1476
-
-
/usr/local/sbin/pkillpkill windump2⤵PID:1482
-
-
/usr/local/bin/pkillpkill windump2⤵PID:1482
-
-
/usr/local/bin/pkillpkill tshark2⤵PID:1475
-
-
/usr/sbin/pkillpkill tcpflow2⤵PID:1481
-
-
/usr/local/sbin/pkillpkill netsniff-ng2⤵PID:1483
-
-
/usr/bin/pkillpkill tcpflow2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1481
-
-
/usr/sbin/pkillpkill tshark2⤵PID:1475
-
-
/usr/sbin/pkillpkill windump2⤵PID:1482
-
-
/usr/local/bin/pkillpkill netsniff-ng2⤵PID:1483
-
-
/usr/bin/pkillpkill windump2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1482
-
-
/usr/bin/pkillpkill tshark2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1475
-
-
/usr/sbin/pkillpkill netsniff-ng2⤵PID:1483
-
-
/usr/bin/pkillpkill netsniff-ng2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1483
-
-
/usr/local/sbin/pkillpkill tcpdump2⤵PID:1474
-
-
/usr/local/bin/pkillpkill tcpdump2⤵PID:1474
-
-
/usr/sbin/pkillpkill tcpdump2⤵PID:1474
-
-
/usr/bin/pkillpkill tcpdump2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1474
-
-
/usr/bin/pkillpkill ngrep2⤵
- Reads CPU attributes
- Reads runtime system information
PID:1480
-
-
/usr/local/sbin/rmrm -rf /usr/bin/ettercap2⤵PID:1501
-
-
/usr/local/bin/rmrm -rf /usr/bin/ettercap2⤵PID:1501
-
-
/usr/sbin/rmrm -rf /usr/bin/ettercap2⤵PID:1501
-
-
/usr/bin/rmrm -rf /usr/bin/ettercap2⤵PID:1501
-
-
/sbin/rmrm -rf /usr/bin/ettercap2⤵PID:1501
-
-
/bin/rmrm -rf /usr/bin/ettercap2⤵PID:1501
-
-
/usr/local/sbin/rmrm -rf /usr/bin/dsniff2⤵PID:1502
-
-
/usr/local/bin/rmrm -rf /usr/bin/dsniff2⤵PID:1502
-
-
/usr/sbin/rmrm -rf /usr/bin/dsniff2⤵PID:1502
-
-
/usr/bin/rmrm -rf /usr/bin/dsniff2⤵PID:1502
-
-
/sbin/rmrm -rf /usr/bin/dsniff2⤵PID:1502
-
-
/bin/rmrm -rf /usr/bin/dsniff2⤵PID:1502
-
-
/usr/local/sbin/rmrm -rf /usr/bin/ngrep2⤵PID:1503
-
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpflow2⤵PID:1504
-
-
/usr/local/sbin/rmrm -rf /usr/bin/netsniff-ng2⤵PID:1506
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/ngrep2⤵PID:1493
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpflow2⤵PID:1494
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/windump2⤵PID:1495
-
-
/usr/local/sbin/rmrm -rf /usr/bin/tcpdump2⤵PID:1497
-
-
/usr/local/sbin/rmrm -rf /usr/bin/tshark2⤵PID:1498
-
-
/usr/local/sbin/rmrm -rf /usr/bin/wireshark2⤵PID:1499
-
-
/usr/local/sbin/rmrm -rf /usr/bin/dumpcap2⤵PID:1500
-
-
/usr/local/sbin/rmrm -rf /usr/bin/windump2⤵PID:1505
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/dsniff2⤵PID:1492
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/ettercap2⤵PID:1491
-
-
/usr/local/bin/rmrm -rf /usr/sbin/ngrep2⤵PID:1493
-
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpflow2⤵PID:1494
-
-
/usr/local/bin/rmrm -rf /usr/bin/netsniff-ng2⤵PID:1506
-
-
/usr/local/bin/rmrm -rf /usr/bin/tcpflow2⤵PID:1504
-
-
/usr/local/bin/rmrm -rf /usr/bin/ngrep2⤵PID:1503
-
-
/usr/local/bin/rmrm -rf /usr/sbin/windump2⤵PID:1495
-
-
/usr/local/bin/rmrm -rf /usr/bin/tcpdump2⤵PID:1497
-
-
/usr/local/bin/rmrm -rf /usr/bin/windump2⤵PID:1505
-
-
/usr/local/bin/rmrm -rf /usr/bin/tshark2⤵PID:1498
-
-
/usr/local/bin/rmrm -rf /usr/bin/dumpcap2⤵PID:1500
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/netsniff-ng2⤵PID:1496
-
-
/usr/local/bin/rmrm -rf /usr/bin/wireshark2⤵PID:1499
-
-
/usr/local/bin/rmrm -rf /usr/sbin/netsniff-ng2⤵PID:1496
-
-
/usr/sbin/rmrm -rf /usr/sbin/tcpflow2⤵PID:1494
-
-
/usr/sbin/rmrm -rf /usr/sbin/ngrep2⤵PID:1493
-
-
/usr/sbin/rmrm -rf /usr/bin/netsniff-ng2⤵PID:1506
-
-
/usr/sbin/rmrm -rf /usr/bin/ngrep2⤵PID:1503
-
-
/usr/sbin/rmrm -rf /usr/bin/tcpflow2⤵PID:1504
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/dumpcap2⤵PID:1490
-
-
/usr/sbin/rmrm -rf /usr/sbin/windump2⤵PID:1495
-
-
/usr/sbin/rmrm -rf /usr/bin/tcpdump2⤵PID:1497
-
-
/usr/local/bin/rmrm -rf /usr/sbin/dsniff2⤵PID:1492
-
-
/usr/sbin/rmrm -rf /usr/bin/tshark2⤵PID:1498
-
-
/usr/local/bin/rmrm -rf /usr/sbin/ettercap2⤵PID:1491
-
-
/usr/sbin/rmrm -rf /usr/bin/windump2⤵PID:1505
-
-
/usr/sbin/rmrm -rf /usr/bin/dumpcap2⤵PID:1500
-
-
/usr/bin/rmrm -rf /usr/sbin/tcpflow2⤵PID:1494
-
-
/usr/sbin/rmrm -rf /usr/sbin/netsniff-ng2⤵PID:1496
-
-
/usr/bin/rmrm -rf /usr/sbin/ngrep2⤵PID:1493
-
-
/usr/bin/rmrm -rf /usr/bin/netsniff-ng2⤵PID:1506
-
-
/usr/bin/rmrm -rf /usr/bin/ngrep2⤵PID:1503
-
-
/usr/bin/rmrm -rf /usr/sbin/windump2⤵PID:1495
-
-
/usr/bin/rmrm -rf /usr/bin/tcpflow2⤵PID:1504
-
-
/usr/bin/rmrm -rf /usr/bin/tcpdump2⤵PID:1497
-
-
/usr/sbin/rmrm -rf /usr/bin/wireshark2⤵PID:1499
-
-
/usr/bin/rmrm -rf /usr/bin/tshark2⤵PID:1498
-
-
/usr/sbin/rmrm -rf /usr/sbin/dsniff2⤵PID:1492
-
-
/usr/bin/rmrm -rf /usr/bin/windump2⤵PID:1505
-
-
/usr/sbin/rmrm -rf /usr/sbin/ettercap2⤵PID:1491
-
-
/usr/local/bin/rmrm -rf /usr/sbin/dumpcap2⤵PID:1490
-
-
/sbin/rmrm -rf /usr/sbin/tcpflow2⤵PID:1494
-
-
/usr/bin/rmrm -rf /usr/sbin/netsniff-ng2⤵PID:1496
-
-
/sbin/rmrm -rf /usr/sbin/ngrep2⤵PID:1493
-
-
/sbin/rmrm -rf /usr/bin/netsniff-ng2⤵PID:1506
-
-
/sbin/rmrm -rf /usr/bin/ngrep2⤵PID:1503
-
-
/sbin/rmrm -rf /usr/bin/tcpflow2⤵PID:1504
-
-
/sbin/rmrm -rf /usr/sbin/windump2⤵PID:1495
-
-
/usr/bin/rmrm -rf /usr/bin/dumpcap2⤵PID:1500
-
-
/sbin/rmrm -rf /usr/bin/tcpdump2⤵PID:1497
-
-
/usr/bin/rmrm -rf /usr/bin/wireshark2⤵PID:1499
-
-
/sbin/rmrm -rf /usr/bin/tshark2⤵PID:1498
-
-
/usr/bin/rmrm -rf /usr/sbin/dsniff2⤵PID:1492
-
-
/sbin/rmrm -rf /usr/bin/windump2⤵PID:1505
-
-
/usr/bin/rmrm -rf /usr/sbin/ettercap2⤵PID:1491
-
-
/bin/rmrm -rf /usr/sbin/tcpflow2⤵PID:1494
-
-
/sbin/rmrm -rf /usr/sbin/netsniff-ng2⤵PID:1496
-
-
/bin/rmrm -rf /usr/bin/netsniff-ng2⤵PID:1506
-
-
/bin/rmrm -rf /usr/sbin/ngrep2⤵PID:1493
-
-
/bin/rmrm -rf /usr/bin/ngrep2⤵PID:1503
-
-
/usr/sbin/rmrm -rf /usr/sbin/dumpcap2⤵PID:1490
-
-
/bin/rmrm -rf /usr/bin/tcpflow2⤵PID:1504
-
-
/bin/rmrm -rf /usr/sbin/windump2⤵PID:1495
-
-
/sbin/rmrm -rf /usr/bin/wireshark2⤵PID:1499
-
-
/bin/rmrm -rf /usr/bin/tcpdump2⤵PID:1497
-
-
/bin/rmrm -rf /usr/bin/tshark2⤵PID:1498
-
-
/sbin/rmrm -rf /usr/bin/dumpcap2⤵PID:1500
-
-
/sbin/rmrm -rf /usr/sbin/dsniff2⤵PID:1492
-
-
/sbin/rmrm -rf /usr/sbin/ettercap2⤵PID:1491
-
-
/bin/rmrm -rf /usr/bin/windump2⤵PID:1505
-
-
/bin/rmrm -rf /usr/sbin/netsniff-ng2⤵PID:1496
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/wireshark2⤵PID:1489
-
-
/usr/bin/rmrm -rf /usr/sbin/dumpcap2⤵PID:1490
-
-
/bin/rmrm -rf /usr/bin/wireshark2⤵PID:1499
-
-
/bin/rmrm -rf /usr/bin/dumpcap2⤵PID:1500
-
-
/bin/rmrm -rf /usr/sbin/dsniff2⤵PID:1492
-
-
/bin/rmrm -rf /usr/sbin/ettercap2⤵PID:1491
-
-
/sbin/rmrm -rf /usr/sbin/dumpcap2⤵PID:1490
-
-
/usr/local/bin/rmrm -rf /usr/sbin/wireshark2⤵PID:1489
-
-
/bin/rmrm -rf /usr/sbin/dumpcap2⤵PID:1490
-
-
/usr/sbin/rmrm -rf /usr/sbin/wireshark2⤵PID:1489
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/tshark2⤵PID:1488
-
-
/usr/bin/rmrm -rf /usr/sbin/wireshark2⤵PID:1489
-
-
/sbin/rmrm -rf /usr/sbin/wireshark2⤵PID:1489
-
-
/usr/local/bin/rmrm -rf /usr/sbin/tshark2⤵PID:1488
-
-
/bin/rmrm -rf /usr/sbin/wireshark2⤵PID:1489
-
-
/usr/sbin/rmrm -rf /usr/sbin/tshark2⤵PID:1488
-
-
/usr/bin/rmrm -rf /usr/sbin/tshark2⤵PID:1488
-
-
/sbin/rmrm -rf /usr/sbin/tshark2⤵PID:1488
-
-
/bin/rmrm -rf /usr/sbin/tshark2⤵PID:1488
-
-
/usr/local/sbin/rmrm -rf /usr/sbin/tcpdump2⤵PID:1487
-
-
/usr/local/bin/rmrm -rf /usr/sbin/tcpdump2⤵PID:1487
-
-
/usr/sbin/rmrm -rf /usr/sbin/tcpdump2⤵PID:1487
-
-
/usr/bin/rmrm -rf /usr/sbin/tcpdump2⤵PID:1487
-
-
/sbin/rmrm -rf /usr/sbin/tcpdump2⤵PID:1487
-
-
/bin/rmrm -rf /usr/sbin/tcpdump2⤵PID:1487
-
-
/bin/shsh -c "systemctl daemon-reload"2⤵PID:1509
-
/bin/systemctlsystemctl daemon-reload3⤵
- Reads runtime system information
PID:1511
-
-
-
/bin/shsh -c "systemctl enable startup_command.service"2⤵PID:1516
-
/bin/systemctlsystemctl enable startup_command.service3⤵PID:1517
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Privilege Escalation
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361B
MD54d2c868f454b6c55731485cf0f886dc0
SHA1032b125de0a28dcee8d8d25fbeeb56db7f403f04
SHA2568c4ae1b82477698f3a8c273b439cb9079794afb8fc33cd4def854936ba37ea2c
SHA512060b2413a0cb2dec0db059c190467b5cb0d76209effea4ae3de2701fa71429b811a6f7e11e813b26806cf72578d1f32b608a02a4ce670ec58b5b65433e3cf11d