Analysis

  • max time kernel
    25s
  • max time network
    28s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    19/03/2025, 21:59

General

  • Target

    hoho.x86

  • Size

    44KB

  • MD5

    e30a2268e4e7b1466396bf4765c1a71a

  • SHA1

    9b981f58e57f94e88259f7d258c0890167b98d81

  • SHA256

    f2c88c292dda473ca4c29ba6e96e57d2ac1ce861f344409f686d78ad1ed2be60

  • SHA512

    25a1a76cb3ade2208d5c7ccb3f77d532ba2efca74b95ef1f7bf0dd37d305d6267349a06541553b57977dff91dec9e3c23561482a4935dc7a5e12d47403ed5f7b

  • SSDEEP

    768:gjo8WnBsux3TUi32+4qbBYSWLg49InbnHYMbJoSFO+Meb4atC:gWBsux3TUiG9qbBYSWv9IjY8JoSFO+1F

Malware Config

Signatures

  • Contacts a large (60197) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 46 IoCs

    Reads data from /proc virtual filesystem.

Processes

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads