Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-12-2024 01:14

General

  • Target

    bca5d47647862b9c9cd2691e9189370a8a939057cd0922b204c60a2b6ff9f29a.elf

  • Size

    177KB

  • MD5

    84d503bc02fc462a84dd65b17bb43c85

  • SHA1

    1fab3e2bca59527d8fdf6345d6b1f5bc4dc826fa

  • SHA256

    bca5d47647862b9c9cd2691e9189370a8a939057cd0922b204c60a2b6ff9f29a

  • SHA512

    f9ee1e31b83757e26d9a26a97f60060ff82296f6add914f814d9b44b8bae96ce4bcc427331b5405169b86feba55672b4d2e9fff8ff0ff2f401325018623710e8

  • SSDEEP

    3072:OLe6vho1QIruCee+asuTuRebU7IVILTZQy38YhTfYo+M/Rvs1tlLn:ee6vhjIr1r+asuTuReAvLT738+x+M/RO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Traces itself 2 IoCs

    Traces itself to prevent debugging attempts

  • Changes its process name 1 IoCs
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bca5d47647862b9c9cd2691e9189370a8a939057cd0922b204c60a2b6ff9f29a.elf
    /tmp/bca5d47647862b9c9cd2691e9189370a8a939057cd0922b204c60a2b6ff9f29a.elf
    1⤵
    • Deletes itself
    • Traces itself
    • Changes its process name
    • Writes file to tmp directory
    PID:654

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads