Analysis

  • max time kernel
    30221s
  • max time network
    182s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    23-11-2022 11:40

General

  • Target

    cb1fbbf8194bc1b67d1416f16801dd6c.elf

  • Size

    121KB

  • MD5

    cb1fbbf8194bc1b67d1416f16801dd6c

  • SHA1

    c3c4a4aa6e2d6932a229b7ff65c353b91ff0827a

  • SHA256

    d377066d8a5e0177262032fb4a803547a819d196da9960a4f4972f35bfa5eeb2

  • SHA512

    24eaef9673a5c45af36e864c8b9d723d00754ada2da688b3500d4d01f74e28f259463a5668884cfa6663b41f83ab350a4f2dcd1ee8a59c70af0caf3f1d9f7206

  • SSDEEP

    3072:qEZhzRw+1o2Clr9EIepHPXB4iqfPjsM/9YM:lZhzp19Ur9EIepHvBkfPIM/9YM

Score
9/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/cb1fbbf8194bc1b67d1416f16801dd6c.elf
    /tmp/cb1fbbf8194bc1b67d1416f16801dd6c.elf
    1⤵
      PID:351

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Impair Defenses

    1
    T1562

    Discovery

    Network Service Scanning

    1
    T1046

    Replay Monitor

    Loading Replay Monitor...

    Downloads