Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    23-11-2024 02:48

General

  • Target

    ac000addce6da9f4ea84a00bf795c4b3710f1092fdf50bd9359ee734c7e7c170.elf

  • Size

    175KB

  • MD5

    bff7537b31cc3b7735fa970314555c95

  • SHA1

    829f037febce3c79139841db272649e72bee8154

  • SHA256

    ac000addce6da9f4ea84a00bf795c4b3710f1092fdf50bd9359ee734c7e7c170

  • SHA512

    3959a05319e4e48b478779262e4633f57a0ab228097392e666d0444800d62930a698a0ed3d70f653ea8d2d2a1cef829a870a92a45557bdf047ee4775c63dec18

  • SSDEEP

    3072:OufUMc2shifQ4zeLaR9DadE8d43WyWLR3wXpoxM/REnVmlHQFY5CL0:FfU3dif5iLaR9DadESuWLR3MOxM/RE6t

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Traces itself 2 IoCs

    Traces itself to prevent debugging attempts

  • Changes its process name 1 IoCs
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/ac000addce6da9f4ea84a00bf795c4b3710f1092fdf50bd9359ee734c7e7c170.elf
    /tmp/ac000addce6da9f4ea84a00bf795c4b3710f1092fdf50bd9359ee734c7e7c170.elf
    1⤵
    • Deletes itself
    • Traces itself
    • Changes its process name
    • Writes file to tmp directory
    PID:647

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads