Analysis
-
max time kernel
149s -
max time network
149s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14/12/2024, 11:38
Behavioral task
behavioral1
Sample
63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf
Resource
debian9-armhf-20240611-en
General
-
Target
63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf
-
Size
208KB
-
MD5
f11b924fc91298f438dc964375faf556
-
SHA1
3e38f4877672317c01ee8add42c2fee04c8cf9e7
-
SHA256
63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9
-
SHA512
d5efb015a5f3222d8263bad6f3e66aa8b0b6b4fd65f90281fc2a860bc0959cb0fc5b74f343e97cf18cbd24c281e51df662265f7c48cdc2dd84565832ff98e3cf
-
SSDEEP
6144:FXr6Pdmvym2kaOUv2UM6Vu3wRM52B9SWM/RNbBR:F7M4ym2kaOUv2UMhAkP/bH
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 664 sh 677 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf File opened for modification /dev/misc/watchdog 63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 663 63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps 63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf/tmp/63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:663 -
/bin/sh/bin/sh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:664 -
/bin/rmrm -rf bin/systemd3⤵PID:665
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:668
-
-
/bin/mvmv /tmp/63766e5f7840669cff5857f9a2785ca88e1edf2200820d894e6fff1ae7b0cef9.elf bin/systemd3⤵
- Reads runtime system information
PID:674
-
-
/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:677
-
-