Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    08-07-2024 15:16

General

  • Target

    3858ec56dc7c28252b1d09eddc418b5bfc24c3b8f6fa7165e3469f6ffaecc42e.elf

  • Size

    159KB

  • MD5

    e3ea41bbbed27a1f7e7563f6c72802ca

  • SHA1

    edc5d1176182856049843b1530fb8b3b8e24a8cc

  • SHA256

    3858ec56dc7c28252b1d09eddc418b5bfc24c3b8f6fa7165e3469f6ffaecc42e

  • SHA512

    5c5c0c22099b7068331a214d38aaaa3520bbfcd1c6d253da70d9df31dc4bbe2cae5ec0db0def027757c81d5418ce11501feb6342f8ea56fdb2e86cf3b4225241

  • SSDEEP

    3072:J+qESLgbxYaHaOufrRIjKE//RBNzQwTHKlM/9RwnrP:JXR0tYaHaOufrqjfBqwTH4M/9CnrP

Score
9/10

Malware Config

Signatures

  • Contacts a large (226142) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Writes file to system bin folder 1 TTPs 1 IoCs
  • Changes its process name 1 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 3 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

Processes

  • /tmp/3858ec56dc7c28252b1d09eddc418b5bfc24c3b8f6fa7165e3469f6ffaecc42e.elf
    /tmp/3858ec56dc7c28252b1d09eddc418b5bfc24c3b8f6fa7165e3469f6ffaecc42e.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    • Enumerates kernel/hardware configuration
    PID:707

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads