Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20250307-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20250307-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
20/03/2025, 23:26
Behavioral task
behavioral1
Sample
linux_386.elf
Resource
ubuntu2204-amd64-20250307-en
General
-
Target
linux_386.elf
-
Size
5.0MB
-
MD5
21ef8d4e6816e58f43beb0aee2422366
-
SHA1
0fcb6e72f604ab6e2afef0a40433b06a29c373bb
-
SHA256
e353d704ff45ff8513fa0ce6685d6dcb84cf7921f6173a935c9a312cde206631
-
SHA512
e091ba1d17ca25af8718114884fa6c0724bc08c561df2adc80d4994eeb37ee2a16000c07c3bf91429c17a800e1af993a12f2a5be0696cb1459f86fdc0a7c8f3b
-
SSDEEP
49152:E33d0lGt6UHcFL7Rn2o03wiEhiDmzzd/9sARlBs/00Cpfx9a9uN+p9hW16klbU6V:E33GlbU8FwmzzRDZ9mpqRV
Malware Config
Extracted
kaiji
156.225.31.175:808
Signatures
-
Kaiji 1 IoCs
Kaiji payload
resource yara_rule behavioral1/files/fstream-6.dat Kaiji -
Kaiji family
-
kaiji_chaosbot 1 IoCs
Chaos-variant payload
resource yara_rule behavioral1/files/fstream-6.dat kaiji_chaosbot -
Executes dropped EXE 1 IoCs
ioc pid /etc/32678 1573 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog linux_386.elf File opened for modification /dev/misc/watchdog linux_386.elf -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /etc/crontab linux_386.elf -
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
description ioc Process File opened for modification /etc/profile.d/bash_config linux_386.elf File opened for modification /etc/profile.d/linux.sh linux_386.elf File opened for modification /etc/profile.d/bash_config.sh linux_386.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for modification /etc/init.d/linux_kill linux_386.elf File opened for modification /etc/init.d/ssh linux_386.elf -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /usr/lib/systemd/system/linux.service linux_386.elf -
Write file to user bin folder 6 IoCs
description ioc Process File opened for modification /usr/bin/dir linux_386.elf File opened for modification /usr/bin/find linux_386.elf File opened for modification /usr/bin/lsof linux_386.elf File opened for modification /usr/bin/ps linux_386.elf File opened for modification /usr/bin/ss linux_386.elf File opened for modification /usr/bin/ls linux_386.elf -
Modifies Bash startup script 2 TTPs 3 IoCs
description ioc Process File opened for modification /etc/profile.d/bash_config.sh linux_386.elf File opened for modification /etc/profile.d/bash_config linux_386.elf File opened for modification /etc/profile.d/linux.sh linux_386.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ksoftirqd/0 1580 linux_386.elf -
Enumerates kernel/hardware configuration 1 TTPs 2 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size Process not Found File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size linux_386.elf -
description ioc Process File opened for reading /proc/1749/stat linux_386.elf File opened for reading /proc/666/stat linux_386.elf File opened for reading /proc/764/stat linux_386.elf File opened for reading /proc/919/stat linux_386.elf File opened for reading /proc/1140/stat linux_386.elf File opened for reading /proc/1355/stat linux_386.elf File opened for reading /proc/1511/stat linux_386.elf File opened for reading /proc/1211/stat linux_386.elf File opened for reading /proc/1581/stat linux_386.elf File opened for reading /proc/1754/stat linux_386.elf File opened for reading /proc/221/stat linux_386.elf File opened for reading /proc/634/stat linux_386.elf File opened for reading /proc/926/stat linux_386.elf File opened for reading /proc/989/stat linux_386.elf File opened for reading /proc/1223/stat linux_386.elf File opened for reading /proc/1426/stat linux_386.elf File opened for reading /proc/608/stat linux_386.elf File opened for reading /proc/639/stat linux_386.elf File opened for reading /proc/907/stat linux_386.elf File opened for reading /proc/1147/stat linux_386.elf File opened for reading /proc/633/stat linux_386.elf File opened for reading /proc/783/stat linux_386.elf File opened for reading /proc/948/stat linux_386.elf File opened for reading /proc/1128/stat linux_386.elf File opened for reading /proc/1346/stat linux_386.elf File opened for reading /proc/1555/stat linux_386.elf File opened for reading /proc/1775/stat linux_386.elf File opened for reading /proc/743/stat linux_386.elf File opened for reading /proc/535/stat linux_386.elf File opened for reading /proc/680/stat linux_386.elf File opened for reading /proc/968/stat linux_386.elf File opened for reading /proc/206/stat linux_386.elf File opened for reading /proc/212/stat linux_386.elf File opened for reading /proc/790/stat linux_386.elf File opened for reading /proc/1127/stat linux_386.elf File opened for reading /proc/1440/stat linux_386.elf File opened for reading /proc/1712/stat linux_386.elf File opened for reading /proc/filesystems systemctl File opened for reading /proc/1755/stat linux_386.elf File opened for reading /proc/593/stat linux_386.elf File opened for reading /proc/769/stat linux_386.elf File opened for reading /proc/1132/stat linux_386.elf File opened for reading /proc/1150/stat linux_386.elf File opened for reading /proc/1589/stat linux_386.elf File opened for reading /proc/1586/stat linux_386.elf File opened for reading /proc/210/stat linux_386.elf File opened for reading /proc/218/stat linux_386.elf File opened for reading /proc/426/stat linux_386.elf File opened for reading /proc/732/stat linux_386.elf File opened for reading /proc/997/stat linux_386.elf File opened for reading /proc/1078/stat linux_386.elf File opened for reading /proc/1091/stat linux_386.elf File opened for reading /proc/585/stat linux_386.elf File opened for reading /proc/643/stat linux_386.elf File opened for reading /proc/1016/stat linux_386.elf File opened for reading /proc/1040/stat linux_386.elf File opened for reading /proc/1153/stat linux_386.elf File opened for reading /proc/1290/stat linux_386.elf File opened for reading /proc/1374/stat linux_386.elf File opened for reading /proc/filesystems systemctl File opened for reading /proc/216/stat linux_386.elf File opened for reading /proc/736/stat linux_386.elf File opened for reading /proc/1279/stat linux_386.elf File opened for reading /proc/1713/stat linux_386.elf -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1
Processes
-
/etc/32678/etc/326781⤵PID:1573
-
/usr/bin/sleepsleep 602⤵PID:1576
-
-
/usr/bin/basenamebasename /usr/sbin/service1⤵PID:1575
-
/tmp/linux_386.elf/tmp/linux_386.elf " "1⤵
- Modifies Watchdog functionality
- Creates/modifies Cron job
- Creates/modifies environment variables
- Modifies init.d
- Modifies systemd
- Write file to user bin folder
- Modifies Bash startup script
- Changes its process name
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:1574 -
/usr/local/sbin/systemctlsystemctl daemon-reload2⤵PID:1592
-
-
/usr/local/bin/systemctlsystemctl daemon-reload2⤵PID:1592
-
-
/usr/sbin/systemctlsystemctl daemon-reload2⤵PID:1592
-
-
/usr/bin/systemctlsystemctl daemon-reload2⤵PID:1592
-
-
/usr/bin/systemctlsystemctl daemon-reload2⤵PID:1627
-
-
/usr/bin/systemctlsystemctl enable linux.service2⤵
- Reads runtime system information
PID:1661
-
-
/usr/bin/systemctlsystemctl start linux.service2⤵PID:1695
-
-
/usr/bin/journalctljournalctl -xe --no-pager2⤵PID:1706
-
-
/usr/bin/basenamebasename /usr/sbin/service2⤵PID:1722
-
-
/usr/bin/basenamebasename /usr/sbin/service2⤵PID:1723
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"2⤵PID:1725
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"2⤵PID:1726
-
-
/usr/local/sbin/systemctlsystemctl start cron.service2⤵PID:1721
-
-
/usr/local/bin/systemctlsystemctl start cron.service2⤵PID:1721
-
-
/usr/sbin/systemctlsystemctl start cron.service2⤵PID:1721
-
-
/usr/bin/systemctlsystemctl start cron.service2⤵
- Reads runtime system information
PID:1721
-
-
/usr/bin/basenamebasename /usr/sbin/service1⤵PID:1577
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"1⤵PID:1586
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"1⤵PID:1585
-
/usr/local/sbin/systemctlsystemctl start crond.service1⤵PID:1572
-
/usr/local/bin/systemctlsystemctl start crond.service1⤵PID:1572
-
/usr/sbin/systemctlsystemctl start crond.service1⤵PID:1572
-
/usr/bin/systemctlsystemctl start crond.service1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
3XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5d73d3376908ea075a939e3871ad0fabe
SHA1320ff65831247ba199515f1b94df26cc8a3e5f76
SHA256edbdabe30d8236a2c0a4eb89dfd597552130e4c1a4e93f8fe1568920442ad73a
SHA51257b83fef88620598beb5d65626bf757d0abef242d2d6a01796a61474dedc5095a4a9d0f292b6abb450cad3d4410ab8456253600f58ddb66cfe6d79e1c8415536
-
Filesize
5.0MB
MD521ef8d4e6816e58f43beb0aee2422366
SHA10fcb6e72f604ab6e2afef0a40433b06a29c373bb
SHA256e353d704ff45ff8513fa0ce6685d6dcb84cf7921f6173a935c9a312cde206631
SHA512e091ba1d17ca25af8718114884fa6c0724bc08c561df2adc80d4994eeb37ee2a16000c07c3bf91429c17a800e1af993a12f2a5be0696cb1459f86fdc0a7c8f3b
-
Filesize
61B
MD5768eaf287796da19e1cf5e0b2fb1b161
SHA16a1ce2ee5ccc86d1f33806feb14547b35290df2a
SHA2561d22620dfb2a6715e5d745aed5cf841ede0e75e1747f12b9b925a2d346bc7ecb
SHA512e6af30c9df4f7f47696069511e64ecbc8e841629d692ee4056503df3533fb7a7a74960698826260355e1dba7b6c562482a27a39bb51a4237473ce4b68472d620
-
Filesize
189B
MD53909975f7cc0d1121c1819b800069f31
SHA13e68de708c2e6c40fab6794afdee3104e5590189
SHA2566876dac71f13a068afb863d257134275f2edba43b2acaf4924fabf97c079070b
SHA51250600cceeb03b05f45ae61d890caee9f51ff390b6776930866e527e071d65d08241fc66673fd9b99d62fbc77d3c00fc3de4d7378cbc42f5daba5d83072b0906e
-
Filesize
37B
MD5cfb4e51061485fe91169381fbdc1538e
SHA19a85b9b766a15b01737a41d680e4593b7a9bde87
SHA256897f37267d0ceaa2fbdaa09847f5d08e6f8b01a0348a0d666264b0f10acd0c90
SHA512fb154ec711d2090a7461da4db8ddad2b522649a27e74162ecb203f539b1729430288bc02d78d2071bde9c4bbc005693403a57612ef50277d52f816cb94524216