Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    11-12-2024 22:51

General

  • Target

    jew.arm7.elf

  • Size

    133KB

  • MD5

    88443a15b4fa6ebd5609234f6f03e0d5

  • SHA1

    3b40c8622a54885a49753f01ee2fc938402f5082

  • SHA256

    695271e627cfcebad8ca32728fadc96af553af5d8b05e24dda0c0b56c310acfa

  • SHA512

    d016b5e627ea5962f4a25e07bc12506bfc3d43da8361c6126603c2025851fe5decc2df8bdde3461eacd9c84e34ec33c3d3ce8acbff9a37a1e9cc13f7e150f1ce

  • SSDEEP

    3072:5KacBqVuJVkW1cIOPZoxNOqMP0wctzHnDPF+84/M/92L18Yj:kacBQuJVkW1cIOaxNOqMPVovF+8MM/9S

Malware Config

Signatures

  • Contacts a large (111644) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Changes its process name 1 IoCs

Processes

  • /tmp/jew.arm7.elf
    /tmp/jew.arm7.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    PID:705

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads