General
-
Target
a762b324f2481e7d4d0389faefa42a57af8df112c208f19f1cfbe5861d9491bf.elf
-
Size
106KB
-
Sample
241129-ed27payrfl
-
MD5
802705ada12322feada9ae8b21622414
-
SHA1
1320214d408933779c789988219f5c322716bb2d
-
SHA256
a762b324f2481e7d4d0389faefa42a57af8df112c208f19f1cfbe5861d9491bf
-
SHA512
b0b757fdff6b3755be6dc77bd6458f7a263fba7b1adcc71f9b4e6578bd09787b96be7f7fb1fe29015da40b5f258bb4e5debe19029b2ccdf658d96c750ef8f89d
-
SSDEEP
1536:1Qyw4JV7fhFCdD/oo6YjeP43rkIMNYt0OkJP7GRSEwaYIOE9IdHWbeev0EJnnMlU:1Qyw4JVapokVFt0JiRSEpKHSpJnnXC
Static task
static1
Behavioral task
behavioral1
Sample
a762b324f2481e7d4d0389faefa42a57af8df112c208f19f1cfbe5861d9491bf.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
a762b324f2481e7d4d0389faefa42a57af8df112c208f19f1cfbe5861d9491bf.elf
-
Size
106KB
-
MD5
802705ada12322feada9ae8b21622414
-
SHA1
1320214d408933779c789988219f5c322716bb2d
-
SHA256
a762b324f2481e7d4d0389faefa42a57af8df112c208f19f1cfbe5861d9491bf
-
SHA512
b0b757fdff6b3755be6dc77bd6458f7a263fba7b1adcc71f9b4e6578bd09787b96be7f7fb1fe29015da40b5f258bb4e5debe19029b2ccdf658d96c750ef8f89d
-
SSDEEP
1536:1Qyw4JV7fhFCdD/oo6YjeP43rkIMNYt0OkJP7GRSEwaYIOE9IdHWbeev0EJnnMlU:1Qyw4JVapokVFt0JiRSEpKHSpJnnXC
-
Contacts a large (15131) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1