Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
09-11-2024 17:52
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20240418-en
General
-
Target
arm7.elf
-
Size
147KB
-
MD5
60eb053a327610867e602054a599fece
-
SHA1
5779d2d820010845048b7d674fa2aef670feeb21
-
SHA256
7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b
-
SHA512
ee02c52a057efd71aa953bbb776ee556fac9b0aeaa9f9c175e8bfb235d29ef0306cb1668015558c699fa622c3f72c2eae80423045d460e3cbb3ce32c92561e1a
-
SSDEEP
3072:CJLce3pC5mj7naLHbz4N9GUJURIJ1FEEXkkTM/9oIMY:CJLcefnaLHbz4NMUJdHEEXkYM/9LMY
Malware Config
Signatures
-
Contacts a large (37368) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 650 sh 660 chmod -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 648 arm7.elf -
description ioc Process File opened for reading /proc/4/cmdline arm7.elf File opened for reading /proc/41/cmdline arm7.elf File opened for reading /proc/275/cmdline arm7.elf File opened for reading /proc/277/cmdline arm7.elf File opened for reading /proc/646/cmdline arm7.elf File opened for reading /proc/782/cmdline arm7.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/3/cmdline arm7.elf File opened for reading /proc/26/cmdline arm7.elf File opened for reading /proc/274/cmdline arm7.elf File opened for reading /proc/19/cmdline arm7.elf File opened for reading /proc/25/cmdline arm7.elf File opened for reading /proc/24/cmdline arm7.elf File opened for reading /proc/98/cmdline arm7.elf File opened for reading /proc/107/cmdline arm7.elf File opened for reading /proc/601/cmdline arm7.elf File opened for reading /proc/11/cmdline arm7.elf File opened for reading /proc/22/cmdline arm7.elf File opened for reading /proc/9/cmdline arm7.elf File opened for reading /proc/20/cmdline arm7.elf File opened for reading /proc/43/cmdline arm7.elf File opened for reading /proc/308/cmdline arm7.elf File opened for reading /proc/647/cmdline arm7.elf File opened for reading /proc/788/cmdline arm7.elf File opened for reading /proc/1/cmdline arm7.elf File opened for reading /proc/5/cmdline arm7.elf File opened for reading /proc/665/cmdline arm7.elf File opened for reading /proc/772/cmdline arm7.elf File opened for reading /proc/784/cmdline arm7.elf File opened for reading /proc/28/cmdline arm7.elf File opened for reading /proc/663/cmdline arm7.elf File opened for reading /proc/17/cmdline arm7.elf File opened for reading /proc/595/cmdline arm7.elf File opened for reading /proc/602/cmdline arm7.elf File opened for reading /proc/762/cmdline arm7.elf File opened for reading /proc/7/cmdline arm7.elf File opened for reading /proc/15/cmdline arm7.elf File opened for reading /proc/774/cmdline arm7.elf File opened for reading /proc/109/cmdline arm7.elf File opened for reading /proc/771/cmdline arm7.elf File opened for reading /proc/264/cmdline arm7.elf File opened for reading /proc/640/cmdline arm7.elf File opened for reading /proc/786/cmdline arm7.elf File opened for reading /proc/10/cmdline arm7.elf File opened for reading /proc/27/cmdline arm7.elf File opened for reading /proc/13/cmdline arm7.elf File opened for reading /proc/14/cmdline arm7.elf File opened for reading /proc/110/cmdline arm7.elf File opened for reading /proc/299/cmdline arm7.elf File opened for reading /proc/659/cmdline arm7.elf File opened for reading /proc/2/cmdline arm7.elf File opened for reading /proc/8/cmdline arm7.elf File opened for reading /proc/778/cmdline arm7.elf File opened for reading /proc/145/cmdline arm7.elf File opened for reading /proc/148/cmdline arm7.elf File opened for reading /proc/21/cmdline arm7.elf File opened for reading /proc/213/cmdline arm7.elf File opened for reading /proc/599/cmdline arm7.elf File opened for reading /proc/644/cmdline arm7.elf File opened for reading /proc/769/cmdline arm7.elf File opened for reading /proc/filesystems mv File opened for reading /proc/12/cmdline arm7.elf File opened for reading /proc/138/cmdline arm7.elf File opened for reading /proc/776/cmdline arm7.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/arm7.elf/tmp/arm7.elf1⤵
- Changes its process name
- Reads runtime system information
PID:648 -
/bin/sh/bin/sh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/arm7.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:650 -
/bin/rmrm -rf bin/systemd3⤵PID:651
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:656
-
-
/bin/mvmv /tmp/arm7.elf bin/systemd3⤵
- Reads runtime system information
PID:658
-
-
/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:660
-
-