Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20250307-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20250307-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
28/03/2025, 00:26
Behavioral task
behavioral1
Sample
g4za.x86
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
g4za.x86
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral3
Sample
g4za.x86
Resource
ubuntu2204-amd64-20250307-en
General
-
Target
g4za.x86
-
Size
73KB
-
MD5
6e6e1cb80bda1d51af6f8d328ce42660
-
SHA1
bf3dfdded3080eed20c455899c52c2f042d7b63b
-
SHA256
1c7ec27edb1e1b5bce7ce676777a0dd9e0bf709db0acaf7053b12b38ec03fb6c
-
SHA512
f694618767a0b01cf0fe84474b1ba8a0cb3074857b05fcab2095bf283d1899b9d3f3b3b4403d53b464361e6398bf35da82694e606d358934a3608b0598d086e8
-
SSDEEP
1536:GD8VBnK13Rg74kwVJStv0qkxAOHItu9ApGZp8GXPTbVhid/Sb:G0BKRRg74kWS90q9k4uGsj8G7ZUdc
Malware Config
Signatures
-
Contacts a large (125880) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Loads a kernel module 64 IoCs
Loads a Linux kernel module, potentially to achieve persistence
pid Process 2554 g4za.x86 2555 g4za.x86 2558 g4za.x86 2555 g4za.x86 2555 g4za.x86 2558 g4za.x86 2555 g4za.x86 2555 g4za.x86 2555 g4za.x86 2555 g4za.x86 2555 g4za.x86 2555 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2555 g4za.x86 2558 g4za.x86 2558 g4za.x86 2555 g4za.x86 2558 g4za.x86 2558 g4za.x86 2555 g4za.x86 2555 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2555 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2558 g4za.x86 2555 g4za.x86 2558 g4za.x86 2558 g4za.x86 2555 g4za.x86 2558 g4za.x86 2558 g4za.x86 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/md2jelmkg31c10fj g4za.x86