Analysis
-
max time kernel
148s -
max time network
150s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
15-02-2025 14:02
General
-
Target
x86.elf
-
Size
48KB
-
MD5
3f283e63f4baa9721604e9238968c4ca
-
SHA1
f6b21f8d0822b9fdf8805632621139f69955c276
-
SHA256
8ff05f51c484428ac251e3c3391c633e39b97eac2077e91f507f58d9ead09a37
-
SHA512
3f5ade9245b26de4567bcf31ea1f4ec40144d46dac65439045b4c7a8134f3ecf242938c0617b4abd051a5a35a33f3c10b7ba472ed7275495ac5fa14f52d1cde3
-
SSDEEP
1536:I1z8LJFEgCxkC9ax+Dd2mTbxH/H1yG14jzSCCZMNJD:I1w3EgikC9g+DxbxHf1yGinqC
Malware Config
Signatures
-
Contacts a large (23995) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
pid Process 2478 x86.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ryuCafyqcDBodvkb( x86.elf