Analysis

  • max time kernel
    147s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    21-11-2024 22:25

General

  • Target

    anarchy.arm.elf

  • Size

    54KB

  • MD5

    7630793c748482bc6ece5a6ab21a27e5

  • SHA1

    99dfad27c3fda13775e1620051e15d7e1a80e99d

  • SHA256

    e3e136d2adf979b6a10acdc6f897a1531ed36aa25a8b31b55d6f17638e1b515a

  • SHA512

    d99991973830f95a9b809e7ac33342348540858b3ffac32f4cd0cb481c6645fecd589a0287899fdac26ee34e6997bbaa88d6cc4af8b8e81af402b631f3099963

  • SSDEEP

    1536:myOl/Ry4OOcUV89GXChSDvAXIaHNIPtv3:myAPQ9GX1DFatC3

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/anarchy.arm.elf
    /tmp/anarchy.arm.elf
    1⤵
    • Modifies Watchdog functionality
    • Changes its process name
    • Reads runtime system information
    PID:658
    • /bin/sh
      sh -c "echo \"/tmp/anarchy.arm.elf &\" >> /etc/rc.local"
      2⤵
        PID:663

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads