General
-
Target
4d38c66f9c89f37059f80311d91e5d60f58befcfea7151f350b706e377d624d3.elf
-
Size
161KB
-
Sample
241001-bmrkrsxglc
-
MD5
ad9e98b3008479ceed4cfe9affdfcd84
-
SHA1
139445315ca6810fd35d70b9226e2f685c7ad46f
-
SHA256
4d38c66f9c89f37059f80311d91e5d60f58befcfea7151f350b706e377d624d3
-
SHA512
4bdd63658aefa910d3115872b828cd7cad6113a92d05319fe5214cc60feb2be09cabf53426a40d7f474e868ae77922505633969793df71ac1b0a8571db93050b
-
SSDEEP
3072:XQgsRje8EywnqadOuiZoRkXAXpoxTHG9ssNbhHKM/9abm3wcGDRs:XQgstE9qadOuiZooAXCm5NbhqM/9abmL
Static task
static1
Behavioral task
behavioral1
Sample
4d38c66f9c89f37059f80311d91e5d60f58befcfea7151f350b706e377d624d3.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
4d38c66f9c89f37059f80311d91e5d60f58befcfea7151f350b706e377d624d3.elf
-
Size
161KB
-
MD5
ad9e98b3008479ceed4cfe9affdfcd84
-
SHA1
139445315ca6810fd35d70b9226e2f685c7ad46f
-
SHA256
4d38c66f9c89f37059f80311d91e5d60f58befcfea7151f350b706e377d624d3
-
SHA512
4bdd63658aefa910d3115872b828cd7cad6113a92d05319fe5214cc60feb2be09cabf53426a40d7f474e868ae77922505633969793df71ac1b0a8571db93050b
-
SSDEEP
3072:XQgsRje8EywnqadOuiZoRkXAXpoxTHG9ssNbhHKM/9abm3wcGDRs:XQgstE9qadOuiZooAXCm5NbhqM/9abmL
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1