Analysis

  • max time kernel
    145s
  • max time network
    134s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20250307-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20250307-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    11/04/2025, 09:10

General

  • Target

    病毒样本/35c568784f18bb908bfc37d35ccfa44d

  • Size

    113KB

  • MD5

    35c568784f18bb908bfc37d35ccfa44d

  • SHA1

    024c6e771a284ab3450e506a1077c2d08c01b707

  • SHA256

    b12a863712d956f6e7821d43505ee19c9b3a0e0678f3c42e1e92af307b6472b3

  • SHA512

    e632c1f7306bebcd58960d797d861382fd741cf777694a581c0c2723fe703b57ab8b25cf796ad5c0e45507d3e52f1bef416cbb5b1f1204b9348de70813416f78

  • SSDEEP

    3072:diry859a2ADJf9wHYqbgFFo8+HeAFiVm7FnVqfJXoebNb:u9a2aLqkrMam7FnVqfJXoebNb

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/病毒样本/35c568784f18bb908bfc37d35ccfa44d
    /tmp/病毒样本/35c568784f18bb908bfc37d35ccfa44d
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:1563

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads