Analysis
-
max time kernel
145s -
max time network
135s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
05-01-2025 07:48
Behavioral task
behavioral1
Sample
a.elf
Resource
ubuntu2204-amd64-20240611-en
ubuntu-22.04-amd64
4 signatures
150 seconds
General
-
Target
a.elf
-
Size
93KB
-
MD5
b062e74dd216b96e8573bb71bb6156a0
-
SHA1
a903e99874d58fa1f799daa23b0af83508b0f4e1
-
SHA256
ae3cbe9f45318d384a1b884c0c78bf7529dcd4d3f8411d40046bb6f926af109b
-
SHA512
425e4cb13cc55e2bdb20af671f8f39795f6d57172a77f0b001dbba8f22793985cda48ae015101bf9b0b23c7f3e4b776bb75424fb28fac79f1750c1906afa9f34
-
SSDEEP
1536:a7LkK1i4Ftacex2FOfWt+AakNbQCOpxVZEV0ZtGBammioVcYRZLrn04i:fK1i4FtacexkUAakNbQCSzGammFVcYRi
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog a.elf File opened for modification /dev/watchdog a.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route a.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 1587 a.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route a.elf