Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    15-11-2024 02:07

General

  • Target

    m-6.8-k.Sakura.elf

  • Size

    156KB

  • MD5

    7aa62ab75ba19e44fa6e1db786629ed0

  • SHA1

    abf6678f1e87fcc789538a33728d468dc372cb7d

  • SHA256

    d7d91306ff19624b291be31cb42c238cfc5383b8517760f4e5670e4afbdddd86

  • SHA512

    a0c589bb67f5ef10ed5881fdba4806900a74651405b83d0ab4e0a592c172db0946e5bc46e50873ac63bce39d789b9a7ac3bf46937e8fbeaff5bc0df2590a1002

  • SSDEEP

    3072:T1g2/eINNlzx2kkQCMOaQcvBpYnyLRM/9q3tmFwfBxKQodn:hg2hNNlzIkk/MOa/7YnydM/9MmFwfBxE

Score
6/10

Malware Config

Signatures

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/m-6.8-k.Sakura.elf
    /tmp/m-6.8-k.Sakura.elf
    1⤵
    • Reads system routing table
    • Reads system network configuration
    PID:707

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads