Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    09/12/2024, 02:25

General

  • Target

    6ca7743b05ad3f62f6868071c2c9f6dee42b284d8c29c0db548e336beb1fd396.elf

  • Size

    177KB

  • MD5

    518d0b383863c7f2219424532267427b

  • SHA1

    819041cc03c021d9e00cf675c7cc20d1676c8951

  • SHA256

    6ca7743b05ad3f62f6868071c2c9f6dee42b284d8c29c0db548e336beb1fd396

  • SHA512

    4ccf640612edaf9f2deea61da28423a2272adf34f5666410378d0ceaf42312cdf8e00a1e864aaf28922b116b128fd16f9b51a18cc6c0deded35e6ecac34850cf

  • SSDEEP

    3072:OzeSvtfD84oALv2eEQakGzORuGMzw99Lcd38YhTfYo+M/RM+FDhdLn:2eSvJvoA7TEQakGzORuBGLcd38+x+M/z

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Traces itself 2 IoCs

    Traces itself to prevent debugging attempts

  • Changes its process name 1 IoCs
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/6ca7743b05ad3f62f6868071c2c9f6dee42b284d8c29c0db548e336beb1fd396.elf
    /tmp/6ca7743b05ad3f62f6868071c2c9f6dee42b284d8c29c0db548e336beb1fd396.elf
    1⤵
    • Deletes itself
    • Traces itself
    • Changes its process name
    • Writes file to tmp directory
    PID:669

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads