Analysis
-
max time kernel
120s -
max time network
68s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
25-03-2024 16:13
Behavioral task
behavioral1
Sample
de6bd4cf60a0d8bf44d80345b7611123
Resource
debian9-armhf-20240226-en
debian-9-armhf
2 signatures
150 seconds
General
-
Target
de6bd4cf60a0d8bf44d80345b7611123
-
Size
4.5MB
-
MD5
de6bd4cf60a0d8bf44d80345b7611123
-
SHA1
e0d832ba70fedc48ab0b347c8b032ae0b798dd43
-
SHA256
cc112184b17d65229ce20487d98a3751dceb3efbee7bf70929a35b66416ae248
-
SHA512
a4a1b22104c82e9ebc0dc50d7aeed922a129f9c962a03d3ef3d6d7889183d24074e1acd18abdd2670a834976276bd9245793476319b1e18ac74c30539c7b2db3
-
SSDEEP
49152:frO0RuO6QtIIySbKXYkbTPb+HGKuAb7/C:DO0QOJtzFeXNbq/C
Score
3/10
Malware Config
Signatures
-
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size de6bd4cf60a0d8bf44d80345b7611123 -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/de6bd4cf60a0d8bf44d80345b7611123.pid de6bd4cf60a0d8bf44d80345b7611123