Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    12-12-2024 14:26

General

  • Target

    003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf

  • Size

    140KB

  • MD5

    2a0b7f16db5aed804c69c300b55412bc

  • SHA1

    ff96a4a08d3a4a08f6fbf31ecf1d2dc2bd8b4806

  • SHA256

    003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf

  • SHA512

    da0ae71358d3865ad1d4af6c1ce299f91e362cdc8aff466d8e2621b19fad0cef3d775baf3a62bc351a440b54de79cb3cc3463db68179943fa750a9b4cef38d9a

  • SSDEEP

    3072:Pib6EdR0WkEZJYqNopEjuvMuK/U6YQXOaXWZ2M/94/r:WnRpkE73uvMuK//YfaX9M/94/r

Malware Config

Signatures

  • Contacts a large (24005) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads process memory 1 TTPs 13 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 1 IoCs

Processes

  • /tmp/003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf
    /tmp/003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf
    1⤵
    • Modifies Watchdog functionality
    • Reads process memory
    • Changes its process name
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads