Overview
overview
7Static
static
1cve_2024_6387/386
ubuntu-24.04-amd64
7cve_2024_6387/aarch64
ubuntu-22.04-amd64
7cve_2024_6387/amd64
ubuntu-20.04-amd64
7cve_2024_6387/arm5
debian-9-armhf
7cve_2024_6387/arm6
debian-12-armhf
7cve_2024_6387/arm7
debian-12-armhf
7cve_2024_6...nup.sh
ubuntu-18.04-amd64
7cve_2024_6...nup.sh
debian-9-armhf
7cve_2024_6...nup.sh
debian-9-mips
7cve_2024_6...nup.sh
debian-9-mipsel
7cve_2024_6387/exploit
ubuntu-18.04-amd64
7cve_2024_6...oit.py
windows7-x64
3cve_2024_6...oit.py
windows10-2004-x64
3cve_2024_6387/mips
debian-9-mips
3cve_2024_6387/mips64
debian-9-mips
cve_2024_6...ps64el
debian-9-mipsel
cve_2024_6387/mipsel
debian-9-mipsel
3Analysis
-
max time kernel
148s -
max time network
172s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
23-11-2024 18:22
Static task
static1
Behavioral task
behavioral1
Sample
cve_2024_6387/386
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral2
Sample
cve_2024_6387/aarch64
Resource
ubuntu2204-amd64-20240729-en
Behavioral task
behavioral3
Sample
cve_2024_6387/amd64
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral4
Sample
cve_2024_6387/arm5
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
cve_2024_6387/arm6
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral6
Sample
cve_2024_6387/arm7
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral7
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral8
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
cve_2024_6387/execute_and_cleanup.sh
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral11
Sample
cve_2024_6387/exploit
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral12
Sample
cve_2024_6387/exploit.py
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
cve_2024_6387/exploit.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
cve_2024_6387/mips
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral15
Sample
cve_2024_6387/mips64
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral16
Sample
cve_2024_6387/mips64el
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral17
Sample
cve_2024_6387/mipsel
Resource
debian9-mipsel-20240611-en
General
-
Target
cve_2024_6387/arm6
-
Size
5.0MB
-
MD5
f01b45a5bea298b837db3af8c5bad744
-
SHA1
79ae24874af457cfd95b5c34f95ecf5ab6ececb5
-
SHA256
77adc73b97c25352eee23fdf52b8b663d606a56a494a2ab1498ba20e7c770327
-
SHA512
4e13687c78344ffcc17d88a49d00c05bb96cf3e1d2c2bc4026cd3fab2dfcd7ce93cab06241f804ffd5e3ce0407f474738a1a47dde1960e5157bfb1dc2ef2b7c0
-
SSDEEP
24576:uMNirxGnmSHuvTEkaxEa8C8L9NNtr3Fr4DEO2W37yWRO2FkNeuV7pbifUXHB7tEF:DbXZshQYTIQRXGxBdZMoA7en2Gd
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
arm6description ioc Process File opened for modification /dev/watchdog arm6 File opened for modification /dev/misc/watchdog arm6 -
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
Processes:
arm6description ioc Process File opened for modification /etc/profile.d/gateway.sh arm6 File opened for modification /etc/profile.d/bash.cfg arm6 File opened for modification /etc/profile.d/bash.cfg.sh arm6 -
Processes:
arm6description ioc Process File opened for modification /etc/init.d/sudo arm6 File opened for modification /etc/init.d/dns-udp4 arm6 File opened for modification /etc/init.d/keyboard-setup.sh arm6 File opened for modification /etc/init.d/ssh arm6 File opened for modification /etc/init.d/hwclock.sh arm6 File opened for modification /etc/init.d/ntpsec arm6 File opened for modification /etc/init.d/selinux-autorelabel arm6 File opened for modification /etc/init.d/console-setup.sh arm6 File opened for modification /etc/init.d/dbus arm6 File opened for modification /etc/init.d/auditd arm6 File opened for modification /etc/init.d/cron arm6 File opened for modification /etc/init.d/exim4 arm6 File opened for modification /etc/init.d/kmod arm6 File opened for modification /etc/init.d/udev arm6 File opened for modification /etc/init.d/alsa-utils arm6 File opened for modification /etc/init.d/apparmor arm6 File opened for modification /etc/init.d/qemu-guest-agent arm6 File opened for modification /etc/init.d/x11-common arm6 File opened for modification /etc/init.d/networking arm6 File opened for modification /etc/init.d/procps arm6 -
Modifies Bash startup script 2 TTPs 3 IoCs
Processes:
arm6description ioc Process File opened for modification /etc/profile.d/bash.cfg arm6 File opened for modification /etc/profile.d/bash.cfg.sh arm6 File opened for modification /etc/profile.d/gateway.sh arm6 -
Enumerates kernel/hardware configuration 1 TTPs 2 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
arm6arm6description ioc Process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size arm6 File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size arm6 -
Processes:
systemctlsystemctlsystemctlsystemctlmountseddescription ioc Process File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems systemctl File opened for reading /proc/filesystems mount File opened for reading /proc/filesystems sed
Processes
-
/tmp/cve_2024_6387/arm6/tmp/cve_2024_6387/arm61⤵
- Enumerates kernel/hardware configuration
PID:750 -
/tmp/cve_2024_6387/arm6/tmp/cve_2024_6387/arm6 " "2⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Modifies Bash startup script
- Enumerates kernel/hardware configuration
PID:754 -
/usr/sbin/update-rc.dupdate-rc.d dns-udp4 defaults3⤵PID:761
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:763
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:763
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:763
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵
- Reads runtime system information
PID:763
-
-
-
/usr/bin/mountmount -o bind /tmp/ /proc/7543⤵
- Reads runtime system information
PID:782
-
-
/usr/sbin/serviceservice cron start3⤵PID:783
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:784
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:785
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵
- Reads runtime system information
PID:788
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵
- Reads runtime system information
PID:787
-
-
-
/usr/local/sbin/systemctlsystemctl start cron.service3⤵PID:783
-
-
/usr/local/bin/systemctlsystemctl start cron.service3⤵PID:783
-
-
/usr/sbin/systemctlsystemctl start cron.service3⤵PID:783
-
-
/usr/bin/systemctlsystemctl start cron.service3⤵
- Reads runtime system information
PID:783
-
-
/usr/bin/systemctlsystemctl start crond.service3⤵
- Reads runtime system information
PID:791
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5f449ef47c4f79ab4ecfe3d11022333d5
SHA161ebb524cee5a049cc96bf2cbf339a47dcb1b622
SHA256503dffa20530956c5f61187e00935f20fe508c35dbb1fcf665b5d28d07d3d704
SHA512a7015de8bd582dbf7ce6df708a58a725e1b1cd472c6616fbb89a9738c533c042ac39c071ca0cf2fc5df8e56f33bf8a28b1ebd3076570f5028cff773af89031f6
-
Filesize
57B
MD525bfc97b9241077f7ee65c9d5831c0ae
SHA14d1e84cfe6f0619642400cbcc77ee008d452f622
SHA2567e18da2137e9453fd98ed61aa79420a173383b2f7a5fe6538b70fbb560f9b3f6
SHA512e3686c1fe664e67fc503275c6c0fa831ee43c1b081d8f826a616314505e3f952f98a8697911d1799e3f8c1957cd3a1bb5f888766877e5081b32942a6f2d8bff3
-
Filesize
106B
MD579fdbb1ceca65b4c5488ffd1b8f86b1f
SHA1455bf2563054900a8e525c0ad4ae2b2772888dad
SHA2561ed0823e7d9b4cd37e3b1d50b1c1fd0417e0d2f15ee5ad01672303ad8f28a853
SHA51298f941dd36433efa566b92c82a75dc315c489921b9fb41f0c74f9eb73d308374b8bf740009e3752f1c190062ae7595fbaee22cfe8a0e4282ee162a074b8ff230
-
Filesize
159B
MD579f1a0bf1a838c817142e43a5818733a
SHA1768ed04a737dbdc969165092694e0e977321ca19
SHA256a3f7d4499b03a14ff2de76122b6a61c221151f59daa6a63a78ae5a805c95a482
SHA512b6d6f76f3e5b768a6670e05276724b70609259c856ba90ad34f8a782ac40134b9cf5cdabebb4aa55f076a786cedf8491adda9835f9d4aee90bd1820a45b2fbce
-
Filesize
3KB
MD547c4f645894eb13aea95f41b2a0b1a75
SHA1041d8f0fa804eca69e5f47c66f3a6422c3a65b0d
SHA2560278ddbd1dfb784c22c31f9c527a5c22c10f44a2b60985d1f40c8afe37812cfa
SHA5120ef394d3a5f04533c1a8fbe8a6bd253081eee15ae4f27b28fdd507199f1b8504026241099aa77312097d8258279971701c82e4a13ddf31dd6fe97956bbc05d93