Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20230831-en -
resource tags
arch:armhfimage:debian9-armhf-20230831-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11/10/2023, 22:51
Behavioral task
behavioral1
Sample
12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf
Resource
debian9-armhf-20230831-en
General
-
Target
12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf
-
Size
149KB
-
MD5
57e6af69e855b8643fcdafa15da70b56
-
SHA1
c2eed39bc01b1abcbca91be92a140299b5e62ab4
-
SHA256
12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736
-
SHA512
dfd94537f3320efe88f8336eb9ca5c83972bb03e66bf22225666c556bf19e2e9e382c15f4f9c6ee7c2c0b4447865711be1cdb6b9354659b640266b66ed54b169
-
SSDEEP
3072:jdpNh4LiR9n7/abHbz4NpaIJ8VIJ1FryXb15AM/9VLkajW:jdpNmiL7/abHbz4NUIJxHryXb12M/9vW
Malware Config
Signatures
-
Contacts a large (34293) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 368 12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/133/cmdline Process not Found File opened for reading /proc/286/cmdline Process not Found File opened for reading /proc/313/cmdline Process not Found File opened for reading /proc/318/cmdline Process not Found File opened for reading /proc/405/cmdline Process not Found File opened for reading /proc/18/cmdline Process not Found File opened for reading /proc/1/cmdline Process not Found File opened for reading /proc/5/cmdline Process not Found File opened for reading /proc/97/cmdline Process not Found File opened for reading /proc/213/cmdline Process not Found File opened for reading /proc/363/cmdline Process not Found File opened for reading /proc/filesystems mv File opened for reading /proc/29/cmdline Process not Found File opened for reading /proc/2/cmdline Process not Found File opened for reading /proc/108/cmdline Process not Found File opened for reading /proc/229/cmdline Process not Found File opened for reading /proc/280/cmdline Process not Found File opened for reading /proc/384/cmdline Process not Found File opened for reading /proc/510/cmdline Process not Found File opened for reading /proc/4/cmdline Process not Found File opened for reading /proc/23/cmdline Process not Found File opened for reading /proc/393/cmdline Process not Found File opened for reading /proc/3/cmdline Process not Found File opened for reading /proc/11/cmdline Process not Found File opened for reading /proc/43/cmdline Process not Found File opened for reading /proc/403/cmdline Process not Found File opened for reading /proc/10/cmdline Process not Found File opened for reading /proc/320/cmdline Process not Found File opened for reading /proc/323/cmdline Process not Found File opened for reading /proc/389/cmdline Process not Found File opened for reading /proc/16/cmdline Process not Found File opened for reading /proc/42/cmdline Process not Found File opened for reading /proc/143/cmdline Process not Found File opened for reading /proc/322/cmdline Process not Found File opened for reading /proc/367/cmdline Process not Found File opened for reading /proc/379/cmdline Process not Found File opened for reading /proc/381/cmdline Process not Found File opened for reading /proc/401/cmdline Process not Found File opened for reading /proc/7/cmdline Process not Found File opened for reading /proc/468/cmdline Process not Found File opened for reading /proc/272/cmdline Process not Found File opened for reading /proc/372/cmdline Process not Found File opened for reading /proc/395/cmdline Process not Found File opened for reading /proc/24/cmdline Process not Found File opened for reading /proc/41/cmdline Process not Found File opened for reading /proc/105/cmdline Process not Found File opened for reading /proc/131/cmdline Process not Found File opened for reading /proc/232/cmdline Process not Found File opened for reading /proc/382/cmdline Process not Found File opened for reading /proc/399/cmdline Process not Found File opened for reading /proc/429/cmdline Process not Found File opened for reading /proc/13/cmdline Process not Found File opened for reading /proc/464/cmdline Process not Found File opened for reading /proc/9/cmdline Process not Found File opened for reading /proc/17/cmdline Process not Found File opened for reading /proc/21/cmdline Process not Found File opened for reading /proc/26/cmdline Process not Found File opened for reading /proc/27/cmdline Process not Found File opened for reading /proc/76/cmdline Process not Found File opened for reading /proc/107/cmdline Process not Found File opened for reading /proc/filesystems mkdir File opened for reading /proc/476/cmdline Process not Found File opened for reading /proc/397/cmdline Process not Found File opened for reading /proc/20/cmdline Process not Found -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf/tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf1⤵
- Changes its process name
PID:368 -
/bin/sh/bin/sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf T�bin/busybox; chmod 777 bin/busybox"2⤵
- Writes file to tmp directory
PID:369 -
/bin/rmrm -rf bin/busybox3⤵PID:370
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:371
-
-
/bin/mvmv /tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf "T�bin/busybox"3⤵
- Reads runtime system information
PID:373
-
-
/bin/chmodchmod 777 "bin/busybox"3⤵PID:376
-
-