Analysis
-
max time kernel
90s -
max time network
166s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
11-12-2024 02:46
Behavioral task
behavioral1
Sample
716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf
Resource
debian12-armhf-20240221-en
General
-
Target
716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf
-
Size
261KB
-
MD5
ad2c77b76858b10ea25fb39d61d857e5
-
SHA1
46cbc2ca9c592506e5c8791bf42aff8164ade4b8
-
SHA256
716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26
-
SHA512
d054467396d1a0a447398f58f9567cb5966355664ee4be9d39b7a94546e259b38927b86ea510ccb16a787617e7b219047fac38f00e7920db80f6c2c5d91c98f3
-
SSDEEP
6144:7uF6+0bzq3bWc+a6rHOQUldy+PhwRMe20pLM/RJmv2RZ6TUPP:780vQWc+a6rHOQUGyypg/3mvmZ6TgP
Malware Config
Signatures
-
Contacts a large (130687) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 706 sh 721 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf File opened for modification /dev/misc/watchdog 716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 704 716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps 716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf/tmp/716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:704 -
/bin/sh/bin/sh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:706 -
/usr/bin/rmrm -rf bin/systemd3⤵PID:709
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:714
-
-
/usr/bin/mvmv /tmp/716c82c534a179738785e0917dde43f24d1ca1fb8a0a1826b651126aa46d1e26.elf bin/systemd3⤵
- Reads runtime system information
PID:717
-
-
/usr/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:721
-
-