Analysis

  • max time kernel
    148s
  • max time network
    137s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-03-2024 02:43

General

  • Target

    a32e912bff92c2c482a129304633cfa55576b801868e90c0d9846fd49b2e3d4c.elf

  • Size

    79KB

  • MD5

    b11856b2a18ece2f2a4cffbdecac05de

  • SHA1

    943a8ac9122942f16365323fe7b2955c2e30dc78

  • SHA256

    a32e912bff92c2c482a129304633cfa55576b801868e90c0d9846fd49b2e3d4c

  • SHA512

    bdcb41df10b219caea221449a5926a3b71d8e1b525ca9af497d15c6b625697ce105a7f6d1417a45bbcee11f238dbc605979e90c763536843e5cd7918dee1365d

  • SSDEEP

    1536:pGVhhJkUqcEJiexWbsEmIx1E03VIYByxUa4XrclkDx3IjYQZ3yQ2K1Y:poktiznx1E03VjwxV4+kDpSZbD+

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 21 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/a32e912bff92c2c482a129304633cfa55576b801868e90c0d9846fd49b2e3d4c.elf
    /tmp/a32e912bff92c2c482a129304633cfa55576b801868e90c0d9846fd49b2e3d4c.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    PID:637
  • /bin/sh
    /bin/sh -c "iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
    1⤵
      PID:642
      • /sbin/iptables
        iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
        2⤵
          PID:644
      • /bin/sh
        /bin/sh -c "/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
        1⤵
          PID:652
          • /bin/busybox
            /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
            2⤵
              PID:655
          • /bin/sh
            /bin/sh -c "/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
            1⤵
              PID:657
              • /bin/iptables
                /bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                2⤵
                  PID:659
              • /bin/sh
                /bin/sh -c "/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                1⤵
                  PID:660
                  • /usr/bin/iptables
                    /usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                    2⤵
                      PID:662
                  • /bin/sh
                    /bin/sh -c "busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                    1⤵
                      PID:663
                      • /bin/busybox
                        busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                        2⤵
                          PID:665

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads