General
-
Target
arm7.nn-20241120-0508.elf
-
Size
185KB
-
Sample
241120-fs459s1pgv
-
MD5
2d15ced2d9e62098c4ad87637a8a35fe
-
SHA1
f8bab4319a890265ad08b599c5d62d676bc720cc
-
SHA256
05f78d4d0a1cad88b46f45f8feee8d0456282c0da55fc77a5387af6edcce6472
-
SHA512
39eeb82d5d330291aef97cc486fe327f617b09614c6bfd1fdf81e5126469efdc67849193af3de5d402af7e219f11343961ebefd927611f6529501bb9e5d5a564
-
SSDEEP
3072:mzH4ssBbOCTqy7aWgSUw/1NKkVS4fTe+YLXnqQZCKvi4+M/98KXmaw+spz:mzHWBbpb7aWgSUw/1NDVSLr0KvihM/92
Static task
static1
Behavioral task
behavioral1
Sample
arm7.nn-20241120-0508.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
arm7.nn-20241120-0508.elf
-
Size
185KB
-
MD5
2d15ced2d9e62098c4ad87637a8a35fe
-
SHA1
f8bab4319a890265ad08b599c5d62d676bc720cc
-
SHA256
05f78d4d0a1cad88b46f45f8feee8d0456282c0da55fc77a5387af6edcce6472
-
SHA512
39eeb82d5d330291aef97cc486fe327f617b09614c6bfd1fdf81e5126469efdc67849193af3de5d402af7e219f11343961ebefd927611f6529501bb9e5d5a564
-
SSDEEP
3072:mzH4ssBbOCTqy7aWgSUw/1NKkVS4fTe+YLXnqQZCKvi4+M/98KXmaw+spz:mzHWBbpb7aWgSUw/1NDVSLr0KvihM/92
-
Contacts a large (12486) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1