Analysis
-
max time kernel
104s -
max time network
152s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
04-12-2024 18:48
Behavioral task
behavioral1
Sample
armv6l.elf
Resource
debian12-armhf-20240221-en
General
-
Target
armv6l.elf
-
Size
174KB
-
MD5
3d1248c7440cc303428a2546d8b2f2fd
-
SHA1
c84ee7dc69bae0b67424c7abf45f76bc18558ae9
-
SHA256
2d0189668bb07a0712cbf7ddc77358ff4156a48025d447bd8c42c10c0853ea47
-
SHA512
89484e6cfe469bb3e63adfa2ae90f7f8dde3ef20b22289cc37459bbbf7cbf207ba69ff11707b0c582afdf4e792e3bf12da3fb6806b97d011c432325298e39799
-
SSDEEP
3072:Pe1ywfQgR7Ee5ZiI/naVa1w/O/N2B1dLkHqsX43mGnWmgcygSw2EZAi:PMEyjaVa8OwdLkHqvmGnWmgcygSw2EZB
Malware Config
Signatures
-
Contacts a large (70535) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog armv6l.elf File opened for modification /dev/misc/watchdog armv6l.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route armv6l.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 709 armv6l.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route armv6l.elf