Analysis
-
max time kernel
150s -
max time network
159s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
10-12-2024 17:12
Behavioral task
behavioral1
Sample
.5r3fqt67ew531has4231.arm7.elf
Resource
debian12-armhf-20240221-en
General
-
Target
.5r3fqt67ew531has4231.arm7.elf
-
Size
261KB
-
MD5
ad2c77b76858b10ea25fb39d61d857e5
-
SHA1
46cbc2ca9c592506e5c8791bf42aff8164ade4b8
-
SHA256
716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26
-
SHA512
d054467396d1a0a447398f58f9567cb5966355664ee4be9d39b7a94546e259b38927b86ea510ccb16a787617e7b219047fac38f00e7920db80f6c2c5d91c98f3
-
SSDEEP
6144:7uF6+0bzq3bWc+a6rHOQUldy+PhwRMe20pLM/RJmv2RZ6TUPP:780vQWc+a6rHOQUGyypg/3mvmZ6TgP
Malware Config
Signatures
-
Contacts a large (110102) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 712 sh 729 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog .5r3fqt67ew531has4231.arm7.elf File opened for modification /dev/misc/watchdog .5r3fqt67ew531has4231.arm7.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 709 .5r3fqt67ew531has4231.arm7.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps .5r3fqt67ew531has4231.arm7.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/.5r3fqt67ew531has4231.arm7.elf/tmp/.5r3fqt67ew531has4231.arm7.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:709 -
/bin/sh/bin/sh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/.5r3fqt67ew531has4231.arm7.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:712 -
/usr/bin/rmrm -rf bin/systemd3⤵PID:718
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:721
-
-
/usr/bin/mvmv /tmp/.5r3fqt67ew531has4231.arm7.elf bin/systemd3⤵
- Reads runtime system information
PID:726
-
-
/usr/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:729
-
-