Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
28-01-2025 17:57
Behavioral task
behavioral1
Sample
x86_64.elf
Resource
ubuntu2404-amd64-20240523-en
5 signatures
150 seconds
General
-
Target
x86_64.elf
-
Size
61KB
-
MD5
d106207e1c5f1800a76b686eeb4e6a2e
-
SHA1
685c4a9ff03085cc86ad09463aaafe792f85c65e
-
SHA256
abae7d7fc17d80162c1dea23b1d65a68537d2afed8774b7341b55cb3e4c09541
-
SHA512
49d6142ce412e7b1fbd811586cd93bbb3066b2b708af2761dda59009982d4b9a13804962a026ad1a4e5b9fb4c70045b14858fd58d622002e5e0b388ea3d37734
-
SSDEEP
1536:VcCUDpjc+wiDl2QlrRaBssPnemtTnGsb92zW3OGJsJm:CCUFjxwiZ2QdRa6sPjdnf2zWeosJ
Score
9/10
Malware Config
Signatures
-
Contacts a large (116577) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog x86_64.elf File opened for modification /dev/misc/watchdog x86_64.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog x86_64.elf File opened for modification /bin/watchdog x86_64.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself cACvzFntorjjiuna78 2496 x86_64.elf