Overview
overview
7Static
static
1cve_2024_6387/386
ubuntu-24.04-amd64
7cve_2024_6387/aarch64
ubuntu-22.04-amd64
7cve_2024_6387/amd64
ubuntu-22.04-amd64
7cve_2024_6387/arm5
debian-9-armhf
7cve_2024_6387/arm6
debian-9-armhf
7cve_2024_6387/arm7
debian-9-armhf
7cve_2024_6...nup.sh
ubuntu-18.04-amd64
7cve_2024_6...nup.sh
debian-9-armhf
7cve_2024_6...nup.sh
debian-9-mips
7cve_2024_6...nup.sh
debian-9-mipsel
7cve_2024_6387/exploit
ubuntu-22.04-amd64
7cve_2024_6...oit.py
windows7-x64
3cve_2024_6...oit.py
windows10-2004-x64
3cve_2024_6387/mips
debian-9-mips
3cve_2024_6387/mips64
debian-9-mips
cve_2024_6...ps64el
debian-9-mipsel
cve_2024_6387/mipsel
debian-12-mipsel
7Analysis
-
max time kernel
149s -
max time network
198s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
23-11-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
cve_2024_6387/386
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral2
Sample
cve_2024_6387/aarch64
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral3
Sample
cve_2024_6387/amd64
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral4
Sample
cve_2024_6387/arm5
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
cve_2024_6387/arm6
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral6
Sample
cve_2024_6387/arm7
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral7
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral8
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
cve_2024_6387/exploit
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral12
Sample
cve_2024_6387/exploit.py
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
cve_2024_6387/exploit.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
cve_2024_6387/mips
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral15
Sample
cve_2024_6387/mips64
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral16
Sample
cve_2024_6387/mips64el
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral17
Sample
cve_2024_6387/mipsel
Resource
debian12-mipsel-20240221-en
General
-
Target
cve_2024_6387/arm7
-
Size
4.9MB
-
MD5
c2e368e608090479ceb4bc9ce6e45081
-
SHA1
d17e71b4448aa8a2a3a753cf867bff73371a4f1a
-
SHA256
5123f1a56a5cbbb49840f41b8c5c7991b789a31cc5a3271b60805dabc40f71c6
-
SHA512
d8553abb0720e9f3d812052accddc0eaaa6121a582ff0c8dc637377a70036f6f04ac990363279aeb2a82839610b3a29aaa8ddd0ec4eb5d2b110eaeeda3d7b68a
-
SSDEEP
49152:4ozxe7ZxI0mFBDQ1WJ9OrA2lIlMMkinIy:4ote7ZxI0mFBDJSC
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog arm7 File opened for modification /dev/misc/watchdog arm7 -
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
description ioc Process File opened for modification /etc/profile.d/bash.cfg arm7 File opened for modification /etc/profile.d/bash.cfg.sh arm7 File opened for modification /etc/profile.d/gateway.sh arm7 -
description ioc Process File opened for modification /etc/init.d/selinux-autorelabel arm7 File opened for modification /etc/init.d/udev arm7 File opened for modification /etc/init.d/cron arm7 File opened for modification /etc/init.d/kmod arm7 File opened for modification /etc/init.d/dns-udp4 arm7 File opened for modification /etc/init.d/exim4 arm7 File opened for modification /etc/init.d/networking arm7 File opened for modification /etc/init.d/ssh arm7 File opened for modification /etc/init.d/sudo arm7 File opened for modification /etc/init.d/dbus arm7 File opened for modification /etc/init.d/hwclock.sh arm7 File opened for modification /etc/init.d/console-setup.sh arm7 File opened for modification /etc/init.d/keyboard-setup.sh arm7 File opened for modification /etc/init.d/procps arm7 File opened for modification /etc/init.d/rsyslog arm7 File opened for modification /etc/init.d/x11-common arm7 File opened for modification /etc/init.d/alsa-utils arm7 File opened for modification /etc/init.d/auditd arm7 -
Modifies Bash startup script 2 TTPs 3 IoCs
description ioc Process File opened for modification /etc/profile.d/bash.cfg arm7 File opened for modification /etc/profile.d/bash.cfg.sh arm7 File opened for modification /etc/profile.d/gateway.sh arm7 -
Enumerates kernel/hardware configuration 1 TTPs 7 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size arm7 File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size arm7 File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
description ioc Process File opened for reading /proc/self/stat systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems mount File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems sed File opened for reading /proc/cmdline systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl
Processes
-
/tmp/cve_2024_6387/arm7/tmp/cve_2024_6387/arm71⤵
- Enumerates kernel/hardware configuration
PID:745 -
/tmp/cve_2024_6387/arm7/tmp/cve_2024_6387/arm7 " "2⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Modifies Bash startup script
- Enumerates kernel/hardware configuration
PID:752 -
/usr/sbin/update-rc.dupdate-rc.d dns-udp4 defaults3⤵PID:770
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:774
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:774
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:774
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:774
-
-
/sbin/systemctlsystemctl daemon-reload4⤵PID:774
-
-
/bin/systemctlsystemctl daemon-reload4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:774
-
-
-
/bin/mountmount -o bind /tmp/ /proc/7523⤵
- Reads runtime system information
PID:777
-
-
/usr/sbin/serviceservice cron start3⤵PID:778
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:779
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:781
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:782
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:785
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵
- Reads runtime system information
PID:786
-
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:778
-
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:778
-
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:778
-
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:778
-
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:778
-
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:778
-
-
/bin/systemctlsystemctl start crond.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:789
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5f449ef47c4f79ab4ecfe3d11022333d5
SHA161ebb524cee5a049cc96bf2cbf339a47dcb1b622
SHA256503dffa20530956c5f61187e00935f20fe508c35dbb1fcf665b5d28d07d3d704
SHA512a7015de8bd582dbf7ce6df708a58a725e1b1cd472c6616fbb89a9738c533c042ac39c071ca0cf2fc5df8e56f33bf8a28b1ebd3076570f5028cff773af89031f6
-
Filesize
4.9MB
MD5c2e368e608090479ceb4bc9ce6e45081
SHA1d17e71b4448aa8a2a3a753cf867bff73371a4f1a
SHA2565123f1a56a5cbbb49840f41b8c5c7991b789a31cc5a3271b60805dabc40f71c6
SHA512d8553abb0720e9f3d812052accddc0eaaa6121a582ff0c8dc637377a70036f6f04ac990363279aeb2a82839610b3a29aaa8ddd0ec4eb5d2b110eaeeda3d7b68a
-
Filesize
57B
MD525bfc97b9241077f7ee65c9d5831c0ae
SHA14d1e84cfe6f0619642400cbcc77ee008d452f622
SHA2567e18da2137e9453fd98ed61aa79420a173383b2f7a5fe6538b70fbb560f9b3f6
SHA512e3686c1fe664e67fc503275c6c0fa831ee43c1b081d8f826a616314505e3f952f98a8697911d1799e3f8c1957cd3a1bb5f888766877e5081b32942a6f2d8bff3
-
Filesize
106B
MD572c697933b1c6df7c87bdd369cb63863
SHA122f1e69833cfc821e361065de90740f515b33152
SHA256971a0328d8dc5d884c0334aec7b56075045284be376dd67b5656a8da0c76884c
SHA512ecb5c32c57f51176acaf7f47043e26b6968b57647cd26dea313fd009de4b8a25f3ccc00022b44a881baf0702b154b3c69604b887e15c2990b96876226a4a0704
-
Filesize
159B
MD579f1a0bf1a838c817142e43a5818733a
SHA1768ed04a737dbdc969165092694e0e977321ca19
SHA256a3f7d4499b03a14ff2de76122b6a61c221151f59daa6a63a78ae5a805c95a482
SHA512b6d6f76f3e5b768a6670e05276724b70609259c856ba90ad34f8a782ac40134b9cf5cdabebb4aa55f076a786cedf8491adda9835f9d4aee90bd1820a45b2fbce
-
Filesize
693B
MD53026ea1fd9033ff98b33eeed6de33855
SHA116adcc93f1d82178f21f0d21828eb1d970a25c36
SHA256d44cdc5eeb3095b522cf728d421f6d64968e6a1a911cd065be642a7f81558a6b
SHA5129d8dc0fa8d4ec085b189e7b581595597012d0047464609ff03436dc5aafe1a5d6020606b89c6ee7586b2a42a5f69a6aa97ae4feb58de9311e7bdfb9fac6aa7a4