Analysis

  • max time kernel
    1405s
  • max time network
    160s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    27-11-2022 23:51

General

  • Target

    jklarm7.elf

  • Size

    121KB

  • MD5

    00715123653296ac9808fb80c7523a0b

  • SHA1

    b39079f672adc38774a8d11d4f98d34e2fb0089a

  • SHA256

    f181dd7b61804fd6b9a084d50ef6d6a512835c3a73ffccf77de9400a7084f4a0

  • SHA512

    70d08604fed969df755d6e87be6ca146f215c7a6a457a874c4e5f3c0fbde7529a53ad1ed23bb11c31adb0826e24f03ce06a5ad11f69a39919b3cbc22be584ed6

  • SSDEEP

    3072:ckhhXRpV11tSlbR44+iV/VVr4vfPjsM/9bnM:ThhXl1PkbR44+i5V+vfPIM/9zM

Score
9/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/jklarm7.elf
    /tmp/jklarm7.elf
    1⤵
      PID:361

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads