Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
16-02-2025 16:07
Behavioral task
behavioral1
Sample
linux_amd64.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
linux_amd64.elf
-
Size
5.2MB
-
MD5
645dd54b4f86542bc9bd64965576c6bc
-
SHA1
50382f576e98dc1d4d35204cf1780fbc4b0d9b66
-
SHA256
dc041ee1a2da8c8ba6e874f414d5b52a0237f39b2995890b56ac7fb173d86104
-
SHA512
b8207db1e063382e8f165198e46f8cad92d2f204edef10a953fece5713fa9e7a99af479146891aa407abd2e6d328b940701f773bfada87ff0d10450814709042
-
SSDEEP
49152:7Xa6xzZWhrb/T4vO90dL3BmAFd4A64nsfJPJ6TdXnT9aqeJaz2xNkapDnYRQoj1P:b2ONLBzSxtSTTElHz
Malware Config
Extracted
kaiji
199.195.252.200:808
Signatures
-
Kaiji 1 IoCs
Kaiji payload
resource yara_rule behavioral1/files/fstream-6.dat Kaiji -
Kaiji family
-
kaiji_chaosbot 1 IoCs
Chaos-variant payload
resource yara_rule behavioral1/files/fstream-6.dat kaiji_chaosbot -
Executes dropped EXE 1 IoCs
ioc pid Process /etc/32678 1604 sh -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog linux_amd64.elf File opened for modification /dev/watchdog linux_amd64.elf -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/crontab bash -
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
description ioc Process File opened for modification /etc/profile.d/bash_config.sh linux_amd64.elf File opened for modification /etc/profile.d/bash_config linux_amd64.elf File opened for modification /etc/profile.d/linux.sh linux_amd64.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for modification /etc/init.d/linux_kill linux_amd64.elf File opened for modification /etc/init.d/ssh linux_amd64.elf -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /usr/lib/systemd/system/linux.service linux_amd64.elf -
Write file to user bin folder 6 IoCs
description ioc Process File opened for modification /usr/bin/dir linux_amd64.elf File opened for modification /usr/bin/find linux_amd64.elf File opened for modification /usr/bin/lsof linux_amd64.elf File opened for modification /usr/bin/ps linux_amd64.elf File opened for modification /usr/bin/ss linux_amd64.elf File opened for modification /usr/bin/ls linux_amd64.elf -
Modifies Bash startup script 2 TTPs 3 IoCs
description ioc Process File opened for modification /etc/profile.d/bash_config linux_amd64.elf File opened for modification /etc/profile.d/linux.sh linux_amd64.elf File opened for modification /etc/profile.d/bash_config.sh linux_amd64.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ksoftirqd/0 1623 linux_amd64.elf -
Enumerates kernel/hardware configuration 1 TTPs 2 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size linux_amd64.elf File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size linux_amd64.elf -
description ioc Process File opened for reading /proc/1803/stat linux_amd64.elf File opened for reading /proc/838/stat linux_amd64.elf File opened for reading /proc/1035/stat linux_amd64.elf File opened for reading /proc/1106/stat linux_amd64.elf File opened for reading /proc/1153/stat linux_amd64.elf File opened for reading /proc/1157/stat linux_amd64.elf File opened for reading /proc/1316/stat linux_amd64.elf File opened for reading /proc/1804/stat linux_amd64.elf File opened for reading /proc/219/stat linux_amd64.elf File opened for reading /proc/411/stat linux_amd64.elf File opened for reading /proc/590/stat linux_amd64.elf File opened for reading /proc/1201/stat linux_amd64.elf File opened for reading /proc/1719/stat linux_amd64.elf File opened for reading /proc/1725/stat linux_amd64.elf File opened for reading /proc/1805/stat linux_amd64.elf File opened for reading /proc/225/stat linux_amd64.elf File opened for reading /proc/772/stat linux_amd64.elf File opened for reading /proc/1170/stat linux_amd64.elf File opened for reading /proc/1403/stat linux_amd64.elf File opened for reading /proc/1710/stat linux_amd64.elf File opened for reading /proc/214/stat linux_amd64.elf File opened for reading /proc/634/stat linux_amd64.elf File opened for reading /proc/833/stat linux_amd64.elf File opened for reading /proc/987/stat linux_amd64.elf File opened for reading /proc/1162/stat linux_amd64.elf File opened for reading /proc/1408/stat linux_amd64.elf File opened for reading /proc/1593/stat linux_amd64.elf File opened for reading /proc/1720/stat linux_amd64.elf File opened for reading /proc/filesystems systemctl File opened for reading /proc/1797/stat linux_amd64.elf File opened for reading /proc/209/stat linux_amd64.elf File opened for reading /proc/308/stat linux_amd64.elf File opened for reading /proc/407/stat linux_amd64.elf File opened for reading /proc/734/stat linux_amd64.elf File opened for reading /proc/738/stat linux_amd64.elf File opened for reading /proc/1075/stat linux_amd64.elf File opened for reading /proc/1567/stat linux_amd64.elf File opened for reading /proc/1051/stat linux_amd64.elf File opened for reading /proc/1173/stat linux_amd64.elf File opened for reading /proc/1770/stat linux_amd64.elf File opened for reading /proc/582/stat linux_amd64.elf File opened for reading /proc/645/stat linux_amd64.elf File opened for reading /proc/968/stat linux_amd64.elf File opened for reading /proc/1112/stat linux_amd64.elf File opened for reading /proc/1154/stat linux_amd64.elf File opened for reading /proc/1185/stat linux_amd64.elf File opened for reading /proc/1749/stat linux_amd64.elf File opened for reading /proc/398/stat linux_amd64.elf File opened for reading /proc/767/stat linux_amd64.elf File opened for reading /proc/1050/stat linux_amd64.elf File opened for reading /proc/1324/stat linux_amd64.elf File opened for reading /proc/filesystems systemctl File opened for reading /proc/1715/stat linux_amd64.elf File opened for reading /proc/1780/stat linux_amd64.elf File opened for reading /proc/filesystems sed File opened for reading /proc/1172/stat linux_amd64.elf File opened for reading /proc/1730/stat linux_amd64.elf File opened for reading /proc/1758/stat linux_amd64.elf File opened for reading /proc/1781/stat linux_amd64.elf File opened for reading /proc/1041/stat linux_amd64.elf File opened for reading /proc/1607/stat linux_amd64.elf File opened for reading /proc/1716/stat linux_amd64.elf File opened for reading /proc/1753/stat linux_amd64.elf File opened for reading /proc/224/stat linux_amd64.elf -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1
Processes
-
/tmp/linux_amd64.elf/tmp/linux_amd64.elf1⤵
- Enumerates kernel/hardware configuration
PID:1598 -
/usr/bin/shsh -c "/etc/32678&"2⤵
- Executes dropped EXE
PID:1602
-
-
/usr/sbin/serviceservice crond start2⤵PID:1603
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:1606
-
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:1617
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"3⤵
- Reads runtime system information
PID:1620
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"3⤵PID:1619
-
-
-
/tmp/linux_amd64.elf/tmp/linux_amd64.elf " "2⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Modifies systemd
- Write file to user bin folder
- Modifies Bash startup script
- Changes its process name
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1605 -
/usr/sbin/update-rc.dupdate-rc.d linux_kill defaults3⤵PID:1628
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:1632
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:1632
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:1632
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:1632
-
-
-
/usr/bin/shsh -c "cd /boot;systemctl daemon-reload;systemctl enable linux.service;systemctl start linux.service;journalctl -xe --no-pager"3⤵PID:1666
-
/usr/bin/systemctlsystemctl daemon-reload4⤵
- Reads runtime system information
PID:1667
-
-
/usr/bin/systemctlsystemctl enable linux.service4⤵PID:1707
-
-
/usr/bin/systemctlsystemctl start linux.service4⤵
- Reads runtime system information
PID:1741
-
-
/usr/bin/journalctljournalctl -xe --no-pager4⤵PID:1752
-
-
-
/usr/bin/shsh -c "cd /boot;ausearch -c 'System.img.conf' --raw | audit2allow -M my-Systemimgconf;semodule -X 300 -i my-Systemimgconf.pp"3⤵PID:1760
-
-
/usr/bin/bashbash -c "echo \"*/1 * * * * root /.img \" >> /etc/crontab"3⤵
- Creates/modifies Cron job
PID:1763
-
-
/usr/bin/renicerenice -20 16053⤵PID:1764
-
-
/usr/bin/mountmount -o bind /tmp/ /proc/16053⤵PID:1765
-
-
/usr/sbin/serviceservice cron start3⤵PID:1767
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1768
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:1769
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:1772
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵PID:1771
-
-
-
/usr/local/sbin/systemctlsystemctl start cron.service3⤵PID:1767
-
-
/usr/local/bin/systemctlsystemctl start cron.service3⤵PID:1767
-
-
/usr/sbin/systemctlsystemctl start cron.service3⤵PID:1767
-
-
/usr/bin/systemctlsystemctl start cron.service3⤵PID:1767
-
-
/usr/bin/systemctlsystemctl start crond.service3⤵PID:1773
-
-
-
/etc/32678/etc/326781⤵PID:1604
-
/usr/bin/sleepsleep 602⤵PID:1607
-
-
/usr/local/sbin/systemctlsystemctl start crond.service1⤵PID:1603
-
/usr/local/bin/systemctlsystemctl start crond.service1⤵PID:1603
-
/usr/sbin/systemctlsystemctl start crond.service1⤵PID:1603
-
/usr/bin/systemctlsystemctl start crond.service1⤵PID:1603
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
3XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5d73d3376908ea075a939e3871ad0fabe
SHA1320ff65831247ba199515f1b94df26cc8a3e5f76
SHA256edbdabe30d8236a2c0a4eb89dfd597552130e4c1a4e93f8fe1568920442ad73a
SHA51257b83fef88620598beb5d65626bf757d0abef242d2d6a01796a61474dedc5095a4a9d0f292b6abb450cad3d4410ab8456253600f58ddb66cfe6d79e1c8415536
-
Filesize
5.2MB
MD5645dd54b4f86542bc9bd64965576c6bc
SHA150382f576e98dc1d4d35204cf1780fbc4b0d9b66
SHA256dc041ee1a2da8c8ba6e874f414d5b52a0237f39b2995890b56ac7fb173d86104
SHA512b8207db1e063382e8f165198e46f8cad92d2f204edef10a953fece5713fa9e7a99af479146891aa407abd2e6d328b940701f773bfada87ff0d10450814709042
-
Filesize
61B
MD5768eaf287796da19e1cf5e0b2fb1b161
SHA16a1ce2ee5ccc86d1f33806feb14547b35290df2a
SHA2561d22620dfb2a6715e5d745aed5cf841ede0e75e1747f12b9b925a2d346bc7ecb
SHA512e6af30c9df4f7f47696069511e64ecbc8e841629d692ee4056503df3533fb7a7a74960698826260355e1dba7b6c562482a27a39bb51a4237473ce4b68472d620
-
Filesize
189B
MD53909975f7cc0d1121c1819b800069f31
SHA13e68de708c2e6c40fab6794afdee3104e5590189
SHA2566876dac71f13a068afb863d257134275f2edba43b2acaf4924fabf97c079070b
SHA51250600cceeb03b05f45ae61d890caee9f51ff390b6776930866e527e071d65d08241fc66673fd9b99d62fbc77d3c00fc3de4d7378cbc42f5daba5d83072b0906e
-
Filesize
37B
MD5cfb4e51061485fe91169381fbdc1538e
SHA19a85b9b766a15b01737a41d680e4593b7a9bde87
SHA256897f37267d0ceaa2fbdaa09847f5d08e6f8b01a0348a0d666264b0f10acd0c90
SHA512fb154ec711d2090a7461da4db8ddad2b522649a27e74162ecb203f539b1729430288bc02d78d2071bde9c4bbc005693403a57612ef50277d52f816cb94524216