Analysis
-
max time kernel
148s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
10-11-2024 02:37
Behavioral task
behavioral1
Sample
7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf
Resource
debian9-armhf-20240418-en
General
-
Target
7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf
-
Size
147KB
-
MD5
60eb053a327610867e602054a599fece
-
SHA1
5779d2d820010845048b7d674fa2aef670feeb21
-
SHA256
7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b
-
SHA512
ee02c52a057efd71aa953bbb776ee556fac9b0aeaa9f9c175e8bfb235d29ef0306cb1668015558c699fa622c3f72c2eae80423045d460e3cbb3ce32c92561e1a
-
SSDEEP
3072:CJLce3pC5mj7naLHbz4N9GUJURIJ1FEEXkkTM/9oIMY:CJLcefnaLHbz4NMUJdHEEXkYM/9LMY
Malware Config
Signatures
-
Contacts a large (38133) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 638 sh 650 chmod -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 637 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf -
description ioc Process File opened for reading /proc/2/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/4/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/6/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/96/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/592/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/623/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/75/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/3/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/7/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/769/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/165/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/280/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/588/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/630/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/654/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/643/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/778/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/filesystems mv File opened for reading /proc/5/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/16/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/21/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/105/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/589/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/107/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/149/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/571/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/774/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/750/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/776/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/1/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/8/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/15/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/23/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/42/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/635/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/763/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/9/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/19/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/275/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/591/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/634/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/645/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/29/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/41/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/752/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/757/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/10/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/12/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/25/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/300/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/651/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/667/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/26/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/139/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/312/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/314/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/761/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/765/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/108/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/266/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/278/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/772/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf File opened for reading /proc/14/cmdline 7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf/tmp/7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf1⤵
- Changes its process name
- Reads runtime system information
PID:637 -
/bin/sh/bin/sh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf�� ��bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:638 -
/bin/rmrm -rf bin/systemd3⤵PID:639
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:641
-
-
/bin/mvmv "/tmp/7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b.elf��" "��bin/systemd"3⤵
- Reads runtime system information
PID:644
-
-
/bin/chmodchmod 777 "bin/systemd"3⤵
- File and Directory Permissions Modification
PID:650
-
-