Analysis
-
max time kernel
44s -
max time network
152s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20250307-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20250307-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
09/03/2025, 14:52
General
-
Target
a.elf
-
Size
68KB
-
MD5
aabd4241f348e5012f552c4296bf07d0
-
SHA1
100e50f0cc34df4dae9241533e281d233618dd6f
-
SHA256
5b569915caa2c631ea99024fbe849bfca00e1822562962f01f1eb0cbc799ad06
-
SHA512
90db44fc17a79fc6c8ca8a55f8771cc99ffc7dc5d30ba755a0ea610148bca1de72dd4042eb897be2d7a890afc499c1c86474370afc64a8c0446e9128398c5647
-
SSDEEP
1536:hqlb5gdNXbczIIdC1P+fyZzD/p3Ersze5qxOq5GzfWr3+wXbig0:cdgdNXbczVdpaZP/p3Ersze5qxOq5Gz2
Malware Config
Signatures
-
Contacts a large (210282) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Loads a kernel module 45 IoCs
Loads a Linux kernel module, potentially to achieve persistence
pid Process 3360 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf 3366 a.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/���������������� a.elf