Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08-07-2023 14:51

General

  • Target

    jew.arm7.elf

  • Size

    128KB

  • MD5

    2d367e134aac4a8ecf911a242c9b4ae2

  • SHA1

    f7e13c3c9cd1c82089ea76e2192bc6976f42aeb6

  • SHA256

    8c944440b6f0d0c42ae8fbef8701bfd801d6b2ca5ecffdaa0e7e6ca1a201fd51

  • SHA512

    83939c35ca2519a5a0f61556f34d3f3b2925ad3477a252672c29e0362f7368d6c31bf66f9a91a1f7ab3b2d22884aca0157d7682e1a2057942c9643cdc3f70702

  • SSDEEP

    3072:ho9lg+zhz3sJu1NHLL8XmiC/glLCZT5HHlOM/9d0Yj:W9lgahz3sE1lcmiC/g1CvHHcM/9mYj

Score
9/10

Malware Config

Signatures

  • Contacts a large (57182) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs

Processes

  • /tmp/jew.arm7.elf
    /tmp/jew.arm7.elf
    1⤵
    • Changes its process name
    PID:355

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads