Analysis
-
max time kernel
104s -
max time network
151s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240522.1-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240522.1-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
15-01-2025 14:48
Behavioral task
behavioral1
Sample
x86_64.elf
Resource
ubuntu2204-amd64-20240522.1-en
ubuntu-22.04-amd64
4 signatures
150 seconds
General
-
Target
x86_64.elf
-
Size
49KB
-
MD5
8009c6add42a8503ba07974025f30f7f
-
SHA1
3aa5119043c6f2bdd546d4963dc1d0ee478f2f8c
-
SHA256
04112cfea5c0f9bfcebbb0de9b42645b81de8bef4028bfd315d43b3daee49674
-
SHA512
2b2ccc906038410349d406cfde4a83153f8da6f19c33ab24c22b6e8d112a3769e72e8a49656c55489b90d06dba267ad8f59b6ec30e42dedb8075302e3b2b8162
-
SSDEEP
1536:z2Cjz+rGHUo+iwYRkawchfD1EPtAFQPfkq:Vj6iHUmwYqs1EPtjfk
Score
9/10
Malware Config
Signatures
-
Contacts a large (114141) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog x86_64.elf File opened for modification /dev/watchdog x86_64.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 1552 x86_64.elf