Analysis
-
max time kernel
145s -
max time network
133s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20240729-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20240729-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
06-01-2025 03:00
Behavioral task
behavioral1
Sample
ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4.elf
Resource
ubuntu2004-amd64-20240729-en
General
-
Target
ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4.elf
-
Size
93KB
-
MD5
3a078fe36abfe3386a34eec8367c6b7b
-
SHA1
28885d5c254ff4cbd8d54e08f4bd611a45c9e4da
-
SHA256
ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4
-
SHA512
359a9a5df8ab20e7c50e07aa760dc71949ea7a6d87a4f15a75ca747ad832a456dd6db11c4e52acba42a7e2946aa759ee90f01e2a3a9721b07119ac62770d536a
-
SSDEEP
1536:Ek0OQmh/c4jU4AJ3cEsMHHz5Dd38q2tBXrpEn9omCUeO7mnmmmioVcYRZLrn04i:Ek0OlfjUdVcRMVDdMqQBXrKJNHAmmmFA
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4.elf File opened for modification /dev/watchdog ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 1414 ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route ac03cbaace321ca3c832198ead3fbd9626533080a2a3908945c24d1ca0ff89e4.elf