Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28/06/2024, 02:27

General

  • Target

    5f2ac36fa105fc60d0d98a559a34ebbcde4a7198138bce3f58658d0508de24b0.elf

  • Size

    144KB

  • MD5

    2ee1a16fe7a360a0582cd1e68bcf0dc2

  • SHA1

    00544cc22cd6819bc4b95a717ba7837585f4546b

  • SHA256

    5f2ac36fa105fc60d0d98a559a34ebbcde4a7198138bce3f58658d0508de24b0

  • SHA512

    26950f2487918b5a94486f1ffe0c742a09c4ca6e1e2f86528109acf312d8f7a4cee3ac58bdc029cabb924093f3241433f3bd69af0bc7dc9ef905088054b53b07

  • SSDEEP

    3072:8b/k1s/WaaYWKw7P+n2OTF1gwS5fe7cTwM/97TH/U:8b/As+aaYWKw7PhOP+fe7ccM/9XHs

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Changes its process name 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/5f2ac36fa105fc60d0d98a559a34ebbcde4a7198138bce3f58658d0508de24b0.elf
    /tmp/5f2ac36fa105fc60d0d98a559a34ebbcde4a7198138bce3f58658d0508de24b0.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    • Reads runtime system information
    PID:657

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads