Analysis

  • max time kernel
    137s
  • max time network
    166s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    10-12-2024 18:36

General

  • Target

    Josho.arm7

  • Size

    125KB

  • MD5

    697af4fdb36ab70a86ab2694dd58ba57

  • SHA1

    6af72a1f205a2dda8eec78626a45bac9a4df8cd0

  • SHA256

    0fb69d16da153a3fb2cfc2314299986401098eba16c85f71c081716255b1df65

  • SHA512

    3d81b93b8d53f6eeda486a43713cd5faee65c1eefeee77757215ad6aa5c31c54a246e1ebde0c36e628c81a9d33dce0d0255602daac824f0b52418050a0680af2

  • SSDEEP

    3072:IZMu4C+u2dLhLRE90bYK5h9T96NOV+5/YtM/9gM/:eMu4C+u+RfbYK5hb6k+5/AM/9gM/

Malware Config

Signatures

  • Contacts a large (140051) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 31 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/Josho.arm7
    /tmp/Josho.arm7
    1⤵
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Changes its process name
    • Reads system network configuration
    • Reads runtime system information
    PID:711

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads