Analysis

  • max time kernel
    9964s
  • max time network
    152s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    07/03/2023, 01:27

General

  • Target

    66003ca71cf12278398fde7082696869f0d112a1506c46392bdd3b22fa193312.elf

  • Size

    58KB

  • MD5

    67bd742c0085406671c1f9d392cfcd1e

  • SHA1

    24e81b8fba4eb58b2b4aa3d185538547323556d1

  • SHA256

    66003ca71cf12278398fde7082696869f0d112a1506c46392bdd3b22fa193312

  • SHA512

    93f7bc2acb33a859d788c57a2f44c75e9af24feddc0efc8cb2dd1172510a14dea202af91d86ef219ce9e3d795991bd70dc311ebc6979f8379440dc9734daac53

  • SSDEEP

    1536:J4S15UOp15uPuH16PEFxCCOcPWm11QHcLGPFYG+:JLP9JPUJcTjW3mf

Score
9/10

Malware Config

Signatures

  • Contacts a large (168374) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 22 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/66003ca71cf12278398fde7082696869f0d112a1506c46392bdd3b22fa193312.elf
    /tmp/66003ca71cf12278398fde7082696869f0d112a1506c46392bdd3b22fa193312.elf
    1⤵
    • Reads runtime system information
    PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads