Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    07-07-2024 04:26

General

  • Target

    shindeVarm7-20240707-0425.elf

  • Size

    125KB

  • MD5

    4a2257eb98a18dd90bc91ac8435093ae

  • SHA1

    5615fd922cc3dd47e3a526701443f3417d9342ce

  • SHA256

    b72250effb80362c27cc3edfc77bd224f02b7c9f13c4fde0d05f86c60561ff0d

  • SHA512

    f3f94911e43f77885e3134a2abca3613fa5714a14ae40adc750b62c0f83b195a7eda447c14ea7a5dd2b90ef88a293d26c73c721d637bb4b61ce1dbba9841aff5

  • SSDEEP

    3072:fisNEds57p6USzkPIxNHmMAfCRRaM/9mTuBgqf:KsNOG7p6USzk8NkfCR4M/9m6yC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Changes its process name 1 IoCs

Processes

  • /tmp/shindeVarm7-20240707-0425.elf
    /tmp/shindeVarm7-20240707-0425.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    PID:710

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Replay Monitor

Loading Replay Monitor...

Downloads