Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231026-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231026-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    14-11-2023 19:13

General

  • Target

    a-r.m-5.Sakura.elf

  • Size

    98KB

  • MD5

    9ac241f4881d95a49eee9aed40711611

  • SHA1

    9196c9acf7a6989fc510da61fdbb62991cc221a1

  • SHA256

    e827b2fa3363a526db964ea77b13a38edf35996619f1bf5bf5e5ecc6179b4989

  • SHA512

    af27a830718e706efb39bcd2c75ff57a0c20032b4604e6482fabb68ebf7fa1d54e185bd94806a93e28f15812e5b2bf3bf56f0fe08c37a0cdc0f789b70408b01a

  • SSDEEP

    3072:VSx+i6mqaObhN8nPNKV+qKmZuqQ4DPwXXtse:y6mRObn8nP7qKmZuqQ4DPwXXtse

Score
6/10

Malware Config

Signatures

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/a-r.m-5.Sakura.elf
    /tmp/a-r.m-5.Sakura.elf
    1⤵
    • Reads system routing table
    • Reads system network configuration
    PID:680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads