Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
153s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
07/03/2025, 01:07
Behavioral task
behavioral1
Sample
c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf
-
Size
38KB
-
MD5
2934298896dab8ecfc15035b5739d070
-
SHA1
ec02459edf218ff107425a240a52161270fa69a8
-
SHA256
c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e
-
SHA512
690a20f0b35cd05e3de2e8a522fba912bdcd00a078aa0e6438480e85808106121be657c555fc380eeb8aa721b9d302f556c20d8184d7b19cc30b913f0b15c9ea
-
SSDEEP
768:A/HmOY4lDYuaLQjGW0JVxzdUBcBm/c+kotPkv5qyXmaOs/lRv9sPw1:2bYG0TkQxhU5ZlG5JXThFuw1
Malware Config
Extracted
mirai
MIRAI
hjfdjkahfkejw.chickenkiller.com
Signatures
-
Mirai family
-
Contacts a large (193696) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1589 sh 1593 chmod -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 1588 c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf -
description ioc Process File opened for reading /proc/self/exe c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf/tmp/c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf1⤵
- Changes its process name
- Reads runtime system information
PID:1588 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:1589 -
/usr/bin/rmrm -rf bin/systemd3⤵PID:1590
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:1591
-
-
/usr/bin/mvmv /tmp/c39fb97d74db466bd305b8695d0b0cd0ebc7707462f479f04baeae904d3dc38e.elf bin/systemd3⤵
- Reads runtime system information
PID:1592
-
-
/usr/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:1593
-
-