General
-
Target
37a69be6ef95161992f6bb0e2e225bf3cedf5f450913ecb2d71b1cb678a0ee3f.raw.elf
-
Size
117KB
-
Sample
240911-2c3hdswhpa
-
MD5
b7987b0d16ee03d17e6c9a9d4ca121d0
-
SHA1
914b313c9c48ea827e5113178edc15eaa0ac2b41
-
SHA256
37a69be6ef95161992f6bb0e2e225bf3cedf5f450913ecb2d71b1cb678a0ee3f
-
SHA512
61ae860dac2634e3d871e16fbb73ca5fdb8b57040d1fb659f6d70a9a7403b1092900bb0fdddad064c49507e3c6daacaeb12f21956f2eeb9516f585bfac9cfca4
-
SSDEEP
3072:G7/k8xuY/FHBUNoDfSgiGpCEHh9jDnmWQm7CD49Z:G7tx1/NBQoGgiGp9jDnmWQmeD49Z
Static task
static1
Behavioral task
behavioral1
Sample
37a69be6ef95161992f6bb0e2e225bf3cedf5f450913ecb2d71b1cb678a0ee3f.raw.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
37a69be6ef95161992f6bb0e2e225bf3cedf5f450913ecb2d71b1cb678a0ee3f.raw.elf
-
Size
117KB
-
MD5
b7987b0d16ee03d17e6c9a9d4ca121d0
-
SHA1
914b313c9c48ea827e5113178edc15eaa0ac2b41
-
SHA256
37a69be6ef95161992f6bb0e2e225bf3cedf5f450913ecb2d71b1cb678a0ee3f
-
SHA512
61ae860dac2634e3d871e16fbb73ca5fdb8b57040d1fb659f6d70a9a7403b1092900bb0fdddad064c49507e3c6daacaeb12f21956f2eeb9516f585bfac9cfca4
-
SSDEEP
3072:G7/k8xuY/FHBUNoDfSgiGpCEHh9jDnmWQm7CD49Z:G7tx1/NBQoGgiGp9jDnmWQmeD49Z
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1