Overview
overview
7Static
static
1cve_2024_6387/386
ubuntu-24.04-amd64
7cve_2024_6387/aarch64
ubuntu-22.04-amd64
7cve_2024_6387/amd64
ubuntu-22.04-amd64
7cve_2024_6387/arm5
debian-9-armhf
7cve_2024_6387/arm6
debian-9-armhf
7cve_2024_6387/arm7
debian-9-armhf
7cve_2024_6...nup.sh
ubuntu-18.04-amd64
7cve_2024_6...nup.sh
debian-9-armhf
7cve_2024_6...nup.sh
debian-9-mips
7cve_2024_6...nup.sh
debian-9-mipsel
7cve_2024_6387/exploit
ubuntu-22.04-amd64
7cve_2024_6...oit.py
windows7-x64
3cve_2024_6...oit.py
windows10-2004-x64
3cve_2024_6387/mips
debian-9-mips
3cve_2024_6387/mips64
debian-9-mips
cve_2024_6...ps64el
debian-9-mipsel
cve_2024_6387/mipsel
debian-12-mipsel
7Analysis
-
max time kernel
149s -
max time network
169s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-11-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
cve_2024_6387/386
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral2
Sample
cve_2024_6387/aarch64
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral3
Sample
cve_2024_6387/amd64
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral4
Sample
cve_2024_6387/arm5
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
cve_2024_6387/arm6
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral6
Sample
cve_2024_6387/arm7
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral7
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral8
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
cve_2024_6387/exploit
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral12
Sample
cve_2024_6387/exploit.py
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
cve_2024_6387/exploit.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
cve_2024_6387/mips
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral15
Sample
cve_2024_6387/mips64
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral16
Sample
cve_2024_6387/mips64el
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral17
Sample
cve_2024_6387/mipsel
Resource
debian12-mipsel-20240221-en
General
-
Target
cve_2024_6387/arm6
-
Size
5.0MB
-
MD5
f01b45a5bea298b837db3af8c5bad744
-
SHA1
79ae24874af457cfd95b5c34f95ecf5ab6ececb5
-
SHA256
77adc73b97c25352eee23fdf52b8b663d606a56a494a2ab1498ba20e7c770327
-
SHA512
4e13687c78344ffcc17d88a49d00c05bb96cf3e1d2c2bc4026cd3fab2dfcd7ce93cab06241f804ffd5e3ce0407f474738a1a47dde1960e5157bfb1dc2ef2b7c0
-
SSDEEP
24576:uMNirxGnmSHuvTEkaxEa8C8L9NNtr3Fr4DEO2W37yWRO2FkNeuV7pbifUXHB7tEF:DbXZshQYTIQRXGxBdZMoA7en2Gd
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog arm6 File opened for modification /dev/misc/watchdog arm6 -
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
description ioc Process File opened for modification /etc/profile.d/bash.cfg arm6 File opened for modification /etc/profile.d/bash.cfg.sh arm6 File opened for modification /etc/profile.d/gateway.sh arm6 -
description ioc Process File opened for modification /etc/init.d/console-setup.sh arm6 File opened for modification /etc/init.d/dbus arm6 File opened for modification /etc/init.d/hwclock.sh arm6 File opened for modification /etc/init.d/ssh arm6 File opened for modification /etc/init.d/x11-common arm6 File opened for modification /etc/init.d/selinux-autorelabel arm6 File opened for modification /etc/init.d/udev arm6 File opened for modification /etc/init.d/auditd arm6 File opened for modification /etc/init.d/cron arm6 File opened for modification /etc/init.d/exim4 arm6 File opened for modification /etc/init.d/keyboard-setup.sh arm6 File opened for modification /etc/init.d/procps arm6 File opened for modification /etc/init.d/rsyslog arm6 File opened for modification /etc/init.d/networking arm6 File opened for modification /etc/init.d/alsa-utils arm6 File opened for modification /etc/init.d/kmod arm6 File opened for modification /etc/init.d/sudo arm6 File opened for modification /etc/init.d/dns-udp4 arm6 -
Modifies Bash startup script 2 TTPs 3 IoCs
description ioc Process File opened for modification /etc/profile.d/bash.cfg arm6 File opened for modification /etc/profile.d/bash.cfg.sh arm6 File opened for modification /etc/profile.d/gateway.sh arm6 -
Enumerates kernel/hardware configuration 1 TTPs 7 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size arm6 File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size arm6 File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
description ioc Process File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/filesystems mount File opened for reading /proc/filesystems sed File opened for reading /proc/cmdline systemctl
Processes
-
/tmp/cve_2024_6387/arm6/tmp/cve_2024_6387/arm61⤵
- Enumerates kernel/hardware configuration
PID:739 -
/tmp/cve_2024_6387/arm6/tmp/cve_2024_6387/arm6 " "2⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Modifies Bash startup script
- Enumerates kernel/hardware configuration
PID:745 -
/usr/sbin/update-rc.dupdate-rc.d dns-udp4 defaults3⤵PID:760
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:761
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:761
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:761
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:761
-
-
/sbin/systemctlsystemctl daemon-reload4⤵PID:761
-
-
/bin/systemctlsystemctl daemon-reload4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:761
-
-
-
/bin/mountmount -o bind /tmp/ /proc/7453⤵
- Reads runtime system information
PID:762
-
-
/usr/sbin/serviceservice cron start3⤵PID:763
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:764
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:765
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:766
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵
- Reads runtime system information
PID:769
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:768
-
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:763
-
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:763
-
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:763
-
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:763
-
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:763
-
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:763
-
-
/bin/systemctlsystemctl start crond.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:770
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5f449ef47c4f79ab4ecfe3d11022333d5
SHA161ebb524cee5a049cc96bf2cbf339a47dcb1b622
SHA256503dffa20530956c5f61187e00935f20fe508c35dbb1fcf665b5d28d07d3d704
SHA512a7015de8bd582dbf7ce6df708a58a725e1b1cd472c6616fbb89a9738c533c042ac39c071ca0cf2fc5df8e56f33bf8a28b1ebd3076570f5028cff773af89031f6
-
Filesize
5.0MB
MD5f01b45a5bea298b837db3af8c5bad744
SHA179ae24874af457cfd95b5c34f95ecf5ab6ececb5
SHA25677adc73b97c25352eee23fdf52b8b663d606a56a494a2ab1498ba20e7c770327
SHA5124e13687c78344ffcc17d88a49d00c05bb96cf3e1d2c2bc4026cd3fab2dfcd7ce93cab06241f804ffd5e3ce0407f474738a1a47dde1960e5157bfb1dc2ef2b7c0
-
Filesize
57B
MD525bfc97b9241077f7ee65c9d5831c0ae
SHA14d1e84cfe6f0619642400cbcc77ee008d452f622
SHA2567e18da2137e9453fd98ed61aa79420a173383b2f7a5fe6538b70fbb560f9b3f6
SHA512e3686c1fe664e67fc503275c6c0fa831ee43c1b081d8f826a616314505e3f952f98a8697911d1799e3f8c1957cd3a1bb5f888766877e5081b32942a6f2d8bff3
-
Filesize
106B
MD58b5fa5c6720f34211590be9e4381211e
SHA16747f1c9405fe23a3a003d5a2ba89872c62fb180
SHA256dda4036fbf9ad979af96e972eafba2a713f3f2dd1773c865b8d22e25d56c6bd2
SHA512cc4b7b6bf732a7706a79ec097ff7b30cfcf4866b0a991c8c2bee68216ee1af3b10c3cec4772a636b973afcf4c6f1ce23adf20b431ba38167fce309382237d2d3
-
Filesize
159B
MD579f1a0bf1a838c817142e43a5818733a
SHA1768ed04a737dbdc969165092694e0e977321ca19
SHA256a3f7d4499b03a14ff2de76122b6a61c221151f59daa6a63a78ae5a805c95a482
SHA512b6d6f76f3e5b768a6670e05276724b70609259c856ba90ad34f8a782ac40134b9cf5cdabebb4aa55f076a786cedf8491adda9835f9d4aee90bd1820a45b2fbce
-
Filesize
693B
MD579a8ef6b2da04d008dbd93ee18d05ff3
SHA1d3b763e602ee85b241c4fa3d9b16b5cd6a5bffd8
SHA256457d0ee9cde306ab80fbab0b04bd2b157f95b10da753072b3aaca16f3e1fad0d
SHA51210ce11b27d8ad50440c658700814cfff42feed586e8312157ed1685441440398a0255c1cd467f2dfdc446033c70a3bcedfe7495b534cd41cdf495d59587bcfc6