Analysis

  • max time network
    155s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-06-2024 01:02

General

  • Target

    6845e34952a416113dbc6fbffae8245d708c9bab6dc801c16f34a84744a3b7cc.elf

  • Size

    61KB

  • MD5

    ba28069faf2b9dbb4345c5db40ede71f

  • SHA1

    9e48423e3893dc5c000b8b99ec3cd6e03377913b

  • SHA256

    6845e34952a416113dbc6fbffae8245d708c9bab6dc801c16f34a84744a3b7cc

  • SHA512

    c749046b98fe666515c65d1f1b76a3beae0ab5498b15e694cfdbd70c57c98ce5714720460bd10f621360327193795829b8478ad08632f88d47b5b40ea4d6ee96

  • SSDEEP

    1536:mWFZrbi9iXq+SlHplLEs7Lgs6oK+o6qL2tY:DT3l6lflLEs7hxKEe2tY

Score
9/10

Malware Config

Signatures

  • Contacts a large (100959) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Unexpected DNS network traffic destination 12 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

Processes

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads