Analysis

  • max time kernel
    151s
  • max time network
    8s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231222-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-02-2024 03:26

General

  • Target

    96d0b2ae7f57ee69b30870481a5a2bc820e818945b88ce1183f3e185be7a59b4.elf

  • Size

    54KB

  • MD5

    2e3c3da156c331de90cd5de6eff18f33

  • SHA1

    7a7c93f62325c9ba5420e1ae5aed02c2333c25ee

  • SHA256

    96d0b2ae7f57ee69b30870481a5a2bc820e818945b88ce1183f3e185be7a59b4

  • SHA512

    66aa4281b83118c0e50cb913e54f79819b1a32a6bef525f9130e687ec485358a21b9cfb661106edf837edcdccca381534a170c751c20eeed626edee006a96a9a

  • SSDEEP

    1536:/M99jmL8BZp9IFUoWKdYuvQ54wIqkypZ:/M9VrmypZ

Score
7/10

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 31 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/96d0b2ae7f57ee69b30870481a5a2bc820e818945b88ce1183f3e185be7a59b4.elf
    /tmp/96d0b2ae7f57ee69b30870481a5a2bc820e818945b88ce1183f3e185be7a59b4.elf
    1⤵
      PID:678

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads