Analysis
-
max time kernel
151s -
max time network
152s -
platform
debian-9_armhf -
resource
debian9-armhf-20231222-en -
resource tags
arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18/02/2024, 17:41
Behavioral task
behavioral1
Sample
49fba2ed3b8a96a9d656267559e404c6.elf
Resource
debian9-armhf-20231222-en
General
-
Target
49fba2ed3b8a96a9d656267559e404c6.elf
-
Size
62KB
-
MD5
49fba2ed3b8a96a9d656267559e404c6
-
SHA1
c5bba3c2a8038fea94b94eeda4454ce13e292bed
-
SHA256
a31ed483553048c95a4e14ac6ffb7b138020cb85f4a999ae2dc2372f987685d3
-
SHA512
7d3e3eb9027633611c4336b50cd78bcf446e442cbc24c5d55ff43e304922cbe737c37317c8610a87d8ab0aa58e6ea0fc2e0fe1ffd0e4513afcc382b8a905e919
-
SSDEEP
768:zHnEczUZv4tZy6hQfyjXI8CMRxYVsx/DeiZvspz1Y3W7wCVy/Jx+5H8hG1rmCd/p:rEFZEZyjyj48NCiZvsphYceZWTMWCBf
Malware Config
Signatures
-
Contacts a large (40623) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 655 49fba2ed3b8a96a9d656267559e404c6.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp 49fba2ed3b8a96a9d656267559e404c6.elf File opened for reading /proc/net/tcp Process not Found -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp 49fba2ed3b8a96a9d656267559e404c6.elf File opened for reading /proc/net/tcp Process not Found -
Reads runtime system information 51 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/570/exe File opened for reading /proc/761/exe File opened for reading /proc/214/fd File opened for reading /proc/264/fd File opened for reading /proc/666/fd File opened for reading /proc/674/exe File opened for reading /proc/269/fd File opened for reading /proc/576/fd File opened for reading /proc/635/fd File opened for reading /proc/572/fd File opened for reading /proc/634/fd File opened for reading /proc/680/exe File opened for reading /proc/774/exe File opened for reading /proc/786/exe File opened for reading /proc/301/fd File opened for reading /proc/570/fd File opened for reading /proc/324/fd File opened for reading /proc/638/exe File opened for reading /proc/131/fd File opened for reading /proc/759/exe File opened for reading /proc/772/exe File opened for reading /proc/595/fd File opened for reading /proc/572/exe File opened for reading /proc/766/exe File opened for reading /proc/268/fd File opened for reading /proc/778/exe File opened for reading /proc/780/exe File opened for reading /proc/576/exe File opened for reading /proc/659/fd File opened for reading /proc/575/exe File opened for reading /proc/770/exe File opened for reading /proc/667/fd File opened for reading /proc/641/exe File opened for reading /proc/783/exe File opened for reading /proc/595/exe File opened for reading /proc/659/exe File opened for reading /proc/776/exe File opened for reading /proc/782/exe File opened for reading /proc/164/fd File opened for reading /proc/768/exe File opened for reading /proc/299/fd File opened for reading /proc/1/fd File opened for reading /proc/640/exe File opened for reading /proc/271/fd File opened for reading /proc/297/fd File opened for reading /proc/575/fd File opened for reading /proc/634/exe File opened for reading /proc/678/exe File opened for reading /proc/270/fd File opened for reading /proc/644/fd File opened for reading /proc/784/exe -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/49fba2ed3b8a96a9d656267559e404c6.elf 49fba2ed3b8a96a9d656267559e404c6.elf