General
-
Target
d33d8e661e9117698f00b1635c7e42171ae5a2738ee40fb4cae28cdfed7e3447.elf
-
Size
5.2MB
-
Sample
250213-hhetqsvpds
-
MD5
dabf6b48ef6b1e2583a8162b903d6264
-
SHA1
42afd0b2022cfc5288b311336f29bed03302ee9b
-
SHA256
d33d8e661e9117698f00b1635c7e42171ae5a2738ee40fb4cae28cdfed7e3447
-
SHA512
b447b36497d491058970c8c6f3e1b81b516a8d7a99a9ae31c53289fa5b27619bdb14b454f31650db9abf486ca28b98a10f7dc50df08598733676bdc2cb9e9229
-
SSDEEP
49152:7Xa6xzZWhrb/T4vO90dL3BmAFd4A64nsfJPJ6TdXnT9aqeJaz2xNkapDnYRQoj1+:b2ONLBzSxtSTIElHz
Behavioral task
behavioral1
Sample
d33d8e661e9117698f00b1635c7e42171ae5a2738ee40fb4cae28cdfed7e3447.elf
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
kaiji
kz1.arsnb.cc:8080
Targets
-
-
Target
d33d8e661e9117698f00b1635c7e42171ae5a2738ee40fb4cae28cdfed7e3447.elf
-
Size
5.2MB
-
MD5
dabf6b48ef6b1e2583a8162b903d6264
-
SHA1
42afd0b2022cfc5288b311336f29bed03302ee9b
-
SHA256
d33d8e661e9117698f00b1635c7e42171ae5a2738ee40fb4cae28cdfed7e3447
-
SHA512
b447b36497d491058970c8c6f3e1b81b516a8d7a99a9ae31c53289fa5b27619bdb14b454f31650db9abf486ca28b98a10f7dc50df08598733676bdc2cb9e9229
-
SSDEEP
49152:7Xa6xzZWhrb/T4vO90dL3BmAFd4A64nsfJPJ6TdXnT9aqeJaz2xNkapDnYRQoj1+:b2ONLBzSxtSTIElHz
-
Kaiji
Kaiji payload
-
Kaiji family
-
kaiji_chaosbot
Chaos-variant payload
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Write file to user bin folder
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
3XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1