Analysis
-
max time kernel
29s -
max time network
30s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19/03/2025, 06:20
Behavioral task
behavioral1
Sample
hoho.x86
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
hoho.x86
Resource
ubuntu2004-amd64-20241127-en
Behavioral task
behavioral3
Sample
hoho.x86
Resource
ubuntu2204-amd64-20250307-en
General
-
Target
hoho.x86
-
Size
44KB
-
MD5
e30a2268e4e7b1466396bf4765c1a71a
-
SHA1
9b981f58e57f94e88259f7d258c0890167b98d81
-
SHA256
f2c88c292dda473ca4c29ba6e96e57d2ac1ce861f344409f686d78ad1ed2be60
-
SHA512
25a1a76cb3ade2208d5c7ccb3f77d532ba2efca74b95ef1f7bf0dd37d305d6267349a06541553b57977dff91dec9e3c23561482a4935dc7a5e12d47403ed5f7b
-
SSDEEP
768:gjo8WnBsux3TUi32+4qbBYSWLg49InbnHYMbJoSFO+Meb4atC:gWBsux3TUiG9qbBYSWv9IjY8JoSFO+1F
Malware Config
Signatures
-
Contacts a large (71006) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description pid Changes the process name, possibly in an attempt to hide itself 1505 -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/tcp -
description ioc File opened for reading /proc/469/fd File opened for reading /proc/470/fd File opened for reading /proc/416/exe File opened for reading /proc/575/exe File opened for reading /proc/666/exe File opened for reading /proc/253/fd File opened for reading /proc/468/fd File opened for reading /proc/471/fd File opened for reading /proc/488/fd File opened for reading /proc/490/fd File opened for reading /proc/542/fd File opened for reading /proc/415/exe File opened for reading /proc/488/exe File opened for reading /proc/472/fd File opened for reading /proc/480/fd File opened for reading /proc/523/fd File opened for reading /proc/423/exe File opened for reading /proc/468/exe File opened for reading /proc/542/exe File opened for reading /proc/637/exe File opened for reading /proc/1506/exe File opened for reading /proc/1509/exe File opened for reading /proc/416/fd File opened for reading /proc/522/fd File opened for reading /proc/560/exe File opened for reading /proc/415/fd File opened for reading /proc/554/fd File opened for reading /proc/472/exe File opened for reading /proc/480/exe File opened for reading /proc/481/exe File opened for reading /proc/330/fd File opened for reading /proc/419/exe File opened for reading /proc/470/exe File opened for reading /proc/490/exe File opened for reading /proc/612/exe File opened for reading /proc/326/fd File opened for reading /proc/422/exe File opened for reading /proc/469/exe File opened for reading /proc/471/exe File opened for reading /proc/477/exe File opened for reading /proc/688/exe File opened for reading /proc/278/fd File opened for reading /proc/419/fd File opened for reading /proc/477/fd File opened for reading /proc/481/fd File opened for reading /proc/522/exe File opened for reading /proc/523/exe File opened for reading /proc/664/exe File opened for reading /proc/1/fd File opened for reading /proc/422/fd File opened for reading /proc/423/fd