Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    11/04/2024, 13:41

General

  • Target

    b50493bdb05ffabc7cda0080614282f9.elf

  • Size

    175KB

  • MD5

    b50493bdb05ffabc7cda0080614282f9

  • SHA1

    a81d8ce5ef49d70529b05756ec910e1c55050b34

  • SHA256

    f57d2d47686c9004b6da2816842cad966f1e5f58449e3eb1b1377f22b7c8a886

  • SHA512

    a25d6132a539b842d0fb2c79742aa71a90a46461f48498bf8df03fc9fdbc965001293e4ddabcd1cb2f9e87fddd7fd6ee9388fbc723e2a71ed02f3f161ebbf839

  • SSDEEP

    3072:4UYsgNeI2by0O6jtaC8Bgo6qsW8rdZ18XJHG+WmM/944Efd3:4UYsgNe00O6taC8Bgo6qr8ZeJHG+DM/0

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Writes file to system bin folder 1 TTPs 2 IoCs

Processes

  • /tmp/b50493bdb05ffabc7cda0080614282f9.elf
    /tmp/b50493bdb05ffabc7cda0080614282f9.elf
    1⤵
    • Changes its process name
    PID:655

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads