Analysis
-
max time kernel
145s -
max time network
148s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
07/03/2025, 13:52
Behavioral task
behavioral1
Sample
uYtea.x86.elf
Resource
ubuntu2204-amd64-20240611-en
3 signatures
150 seconds
General
-
Target
uYtea.x86.elf
-
Size
54KB
-
MD5
e8ee0839bb7869765d80e4280d585222
-
SHA1
e0aa7ad73b70d2fbd0f8f4ca2d5ca417c6e36538
-
SHA256
34537b3ae42d5d93060f42ccd019a8e976290a01b0380e6688a2dfa1515cd1a6
-
SHA512
a3570f2617a4ed149c1a8a8a396a2d0522c09551ab54ef7c7b882c71b66ac3cd9246e552b6acaceeb2585c337bee9e471af729dee5a08f9a491ab14a6c72f02b
-
SSDEEP
768:FmnthEsW5qnF15RY1dhPe7oXTmc6Dj5gk9vWnTI4eBH+4sToQLDLFv:Yn/EsW5qhSh6amnlWnU4GH+dNLt
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 IoCs
description ioc File opened for modification /sbin/watchdog -
Changes its process name 1 IoCs
description pid Changes the process name, possibly in an attempt to hide itself 1568