General
-
Target
efdc414232bc0a035bb6980c8bd5034096d57e07b1a914845eac55ff6ca44792.elf
-
Size
5.0MB
-
Sample
250223-dlrkgsvpg1
-
MD5
cdff4380cd03068d5d82f3b0d1a1261b
-
SHA1
a5d69b6d3b6877d71fbf1fdc652410a5dfa61e27
-
SHA256
efdc414232bc0a035bb6980c8bd5034096d57e07b1a914845eac55ff6ca44792
-
SHA512
a9db69bba97ed167e450bfbfbc2cf7375770a6018c5fb3ec7348fc04cf5479a08654d0478322f9b89d23ded8220c358aa551fc3c37e657a4df678d069cc74347
-
SSDEEP
49152:aIJ8Ou+wh2zUVtN9vEaBPC3uIdlLloDH8QEpuGr6KpZd1I1J:ayxyl/N9vROqcK
Behavioral task
behavioral1
Sample
efdc414232bc0a035bb6980c8bd5034096d57e07b1a914845eac55ff6ca44792.elf
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
kaiji
196.251.85.22:50000
Targets
-
-
Target
efdc414232bc0a035bb6980c8bd5034096d57e07b1a914845eac55ff6ca44792.elf
-
Size
5.0MB
-
MD5
cdff4380cd03068d5d82f3b0d1a1261b
-
SHA1
a5d69b6d3b6877d71fbf1fdc652410a5dfa61e27
-
SHA256
efdc414232bc0a035bb6980c8bd5034096d57e07b1a914845eac55ff6ca44792
-
SHA512
a9db69bba97ed167e450bfbfbc2cf7375770a6018c5fb3ec7348fc04cf5479a08654d0478322f9b89d23ded8220c358aa551fc3c37e657a4df678d069cc74347
-
SSDEEP
49152:aIJ8Ou+wh2zUVtN9vEaBPC3uIdlLloDH8QEpuGr6KpZd1I1J:ayxyl/N9vROqcK
-
Kaiji
Kaiji payload
-
Kaiji family
-
Renames multiple (1040) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Abuse Elevation Control Mechanism: Sudo and Sudo Caching
Abuse sudo or cached sudo credentials to execute code.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-