Analysis
-
max time kernel
151s -
max time network
154s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
29-05-2023 16:20
General
-
Target
28f2d15a7bae63fdb620eccf7a05f38b.elf
-
Size
55KB
-
MD5
28f2d15a7bae63fdb620eccf7a05f38b
-
SHA1
68f89a0704af09b90fa0052a5f4d907fb4d6b18c
-
SHA256
33a99c61e56fe78994777d4bae62862ec22e2e7e1289c1546913c1cad0728217
-
SHA512
876a50d5dad4f563549393ffdbe57573b7bf2d303b413ddae4a693891eea3d0764690cb0467130de82a37792fcdd77664a21b749c9ce872d17cc95b276dbb100
-
SSDEEP
1536:3qdcbpON3LGFXB4Foq3TxuWUPgWvdm6x2CT:3GUziocvUPjPcCT
Malware Config
Signatures
-
Contacts a large (178812) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
28f2d15a7bae63fdb620eccf7a05f38b.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /var/Sofia 355 28f2d15a7bae63fdb620eccf7a05f38b.elf -
Deletes itself 1 IoCs
Processes:
28f2d15a7bae63fdb620eccf7a05f38b.elfpid process 355 28f2d15a7bae63fdb620eccf7a05f38b.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 2 IoCs
Reads data from /proc virtual filesystem.
Processes:
28f2d15a7bae63fdb620eccf7a05f38b.elfdescription ioc process File opened for reading /proc/self/exe 28f2d15a7bae63fdb620eccf7a05f38b.elf File opened for reading /proc/stat