Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231222-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    31/12/2023, 03:07

General

  • Target

    25c2fb28aae3e071a68b80de5f3709b0

  • Size

    53KB

  • MD5

    25c2fb28aae3e071a68b80de5f3709b0

  • SHA1

    93c66b2b299bb7e0ef803247190a8b71d4d210c2

  • SHA256

    ad034b60ff30545b08fd9217e779914bfb9d5cc99cb35a293c931163c0929237

  • SHA512

    59cfa4b32050dbfdc4c4bae3ba7ba0f208a967d28f6b7b5b87aaa497ffcefd28de1a8708dd9dcaae91cee4601294b13dd48c78ea7d3012ffeed1f1ec52127965

  • SSDEEP

    1536:x4nyTvSYCtxo+SbQgcQ644v880IR2G7gQgYVfBjOc8FRDC:nT3C/o9bQgcQ644v8JIR2omfe

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 8 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/25c2fb28aae3e071a68b80de5f3709b0
    /tmp/25c2fb28aae3e071a68b80de5f3709b0
    1⤵
    • Changes its process name
    • Deletes itself
    • Writes file to tmp directory
    PID:665

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads