Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20230831-en
  • resource tags

    arch:armhfimage:debian9-armhf-20230831-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    11/10/2023, 22:51

General

  • Target

    12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf

  • Size

    149KB

  • MD5

    57e6af69e855b8643fcdafa15da70b56

  • SHA1

    c2eed39bc01b1abcbca91be92a140299b5e62ab4

  • SHA256

    12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736

  • SHA512

    dfd94537f3320efe88f8336eb9ca5c83972bb03e66bf22225666c556bf19e2e9e382c15f4f9c6ee7c2c0b4447865711be1cdb6b9354659b640266b66ed54b169

  • SSDEEP

    3072:jdpNh4LiR9n7/abHbz4NpaIJ8VIJ1FryXb15AM/9VLkajW:jdpNmiL7/abHbz4NUIJxHryXb12M/9vW

Score
9/10

Malware Config

Signatures

  • Contacts a large (34293) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf
    /tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf
    1⤵
    • Changes its process name
    PID:368
    • /bin/sh
      /bin/sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf T�bin/busybox; chmod 777 bin/busybox"
      2⤵
      • Writes file to tmp directory
      PID:369
      • /bin/rm
        rm -rf bin/busybox
        3⤵
          PID:370
        • /bin/mkdir
          mkdir bin
          3⤵
          • Reads runtime system information
          PID:371
        • /bin/mv
          mv /tmp/12ea40e07280bb604f87f60cc48eb99352bb3dc1a98589950119d2f771f72736_JC.elf "T�bin/busybox"
          3⤵
          • Reads runtime system information
          PID:373
        • /bin/chmod
          chmod 777 "bin/busybox"
          3⤵
            PID:376

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads