Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-11-2024 17:52

General

  • Target

    armv4l.elf

  • Size

    126KB

  • MD5

    90866f08bfefe79ff181f6b65a1a32b1

  • SHA1

    2db3b6b1532d15c6fa046c9472a6720c0bc383ec

  • SHA256

    616d5263976607ab8bf4ba56a840978b036b706dd81ecee7d41eb0e5bf92248d

  • SHA512

    386e5317132538e4a59b65f3a000594d3fad89bb15710f02dff710962b1ec55817937cddeeb949b879a80e78176953204846be7c1570e644a77f51094a570f80

  • SSDEEP

    3072:6jVlyaL5JCrIpv04spbttiEiTmP46aQyfPlfKsNb:yoCJCN4spbHemP46aQyfPlfKsNb

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/armv4l.elf
    /tmp/armv4l.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:641

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads