General

  • Target

    arm

  • Size

    4.6MB

  • Sample

    220802-jzq4rscgb3

  • MD5

    ab9781119e7ce3ecc064441b85453885

  • SHA1

    a93c147609fd3527808dd06760f40464de60d804

  • SHA256

    59b10e76d708320ee2a62fa62d811416f48fe3bd97149dcf8acf256940efcb54

  • SHA512

    f92c9d373bdcd3b07fa4832682cf5b493d7296c8c50a308bf77bc1aa63059284abcd802a423d15f215af01ac3ffd80aa1acf0105740fec26cd319e9186ae6e77

Score
10/10

Malware Config

Targets

    • Target

      arm

    • Size

      4.6MB

    • MD5

      ab9781119e7ce3ecc064441b85453885

    • SHA1

      a93c147609fd3527808dd06760f40464de60d804

    • SHA256

      59b10e76d708320ee2a62fa62d811416f48fe3bd97149dcf8acf256940efcb54

    • SHA512

      f92c9d373bdcd3b07fa4832682cf5b493d7296c8c50a308bf77bc1aa63059284abcd802a423d15f215af01ac3ffd80aa1acf0105740fec26cd319e9186ae6e77

    Score
    9/10
    • Writes file to system bin folder

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

    • Reads CPU attributes

    • Enumerates kernel/hardware configuration

      Reads contents of /sys virtual filesystem to enumerate system information.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks