Analysis
-
max time kernel
145s -
max time network
128s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
06-01-2025 02:02
Behavioral task
behavioral1
Sample
01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b.elf
-
Size
108KB
-
MD5
220ce404a1b630ee9ac6d040b808bc8a
-
SHA1
52c19820ebc5fe07cd9f7a007c6576ac5216c956
-
SHA256
01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b
-
SHA512
ab3c414d3e2c5111fd5052737eb05dfbd74fa882fbf0dc0aba9c1f80cc3bf6b1fd954b28c23c1847fc2cbf087a5515ad90c4a02931d7472c13a84a9521d1d59c
-
SSDEEP
3072:RiryBV5RUKun9qEbB6yqz45feauvU70m7FnVYIY+F5mRe:F5sXZqMxYU70m7FnVYIY+F5mRe
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b.elf File opened for modification /dev/misc/watchdog 01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 2417 01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 01f9c04efb37e80965cc9a0f7382b0e60588d3ab627f1d22d38ff121a861c98b.elf