Analysis
-
max time kernel
10s -
max time network
14s -
platform
debian-9_armhf -
resource
debian9-armhf-20231215-en -
resource tags
arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
30-12-2023 04:57
Behavioral task
behavioral1
Sample
0f43c8c411edff20933370d0a4648ec8
Resource
debian9-armhf-20231215-en
debian-9-armhf
2 signatures
150 seconds
General
-
Target
0f43c8c411edff20933370d0a4648ec8
-
Size
4.5MB
-
MD5
0f43c8c411edff20933370d0a4648ec8
-
SHA1
7f67427e9821d846842bd30e19fa3f353b4a1f74
-
SHA256
0e4534d015c4e6691ff3920b19c93d63c61a0f36497cb0861a149999b61b98e1
-
SHA512
daca356e2639bcd5c643dcfb9e047302b6d37927e072c0172e804a538adf8e735c24b14380b73da9ab8ea02c84d9633c563186ffc420090b03134a53538ad36e
-
SSDEEP
49152:trfeR3NTM4k4wrL53kmBwVSC45KuAb7/C:1feVNo4b6F34SC/C
Score
3/10
Malware Config
Signatures
-
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size 0f43c8c411edff20933370d0a4648ec8 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/0f43c8c411edff20933370d0a4648ec8.pid 0f43c8c411edff20933370d0a4648ec8