Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20/12/2023, 01:43

General

  • Target

    7a7c85e4f7e738a3ff61e1baf5209daa

  • Size

    106KB

  • MD5

    7a7c85e4f7e738a3ff61e1baf5209daa

  • SHA1

    d10d61cef3e9d63f8cb667a8c3bf39fe6f62e3b9

  • SHA256

    61ca0ae59e2ac0585594946a6d063a724721999d9c6f09914e96c7ae1daffe68

  • SHA512

    b82182253a3271645621df34aa51395aa5ebb0118ceb98611ca90517f8aa53c60784dc85d61dd4af2045f7da3ebdc0f935af45052f1afe83ef03411496017436

  • SSDEEP

    1536:22n25KJ810ErA0mU4juvrgAkoujRllmGiqWCCUI/v+z7gsZZzw/95/GzdbdVTSd:SKJi0en4jergAkiyWL5n+3gsXM/9NGzk

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs

Processes

  • /tmp/7a7c85e4f7e738a3ff61e1baf5209daa
    /tmp/7a7c85e4f7e738a3ff61e1baf5209daa
    1⤵
    • Changes its process name
    PID:651

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads