Analysis
-
max time kernel
142s -
max time network
151s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
15-12-2024 02:01
Behavioral task
behavioral1
Sample
0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf
Resource
debian12-armhf-20240418-en
General
-
Target
0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf
-
Size
161KB
-
MD5
0a0041f12e0ee267a2fbfe015cee0815
-
SHA1
1d7e6dbf72ee434aa69daf9ef383cb81d6e81dd9
-
SHA256
0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8
-
SHA512
c68a8599c6e5a3bd4858fcacf65da3b0fe183ae4e646f0c1603ab39c9b0a6aa49ac7ce4629c99a5a9a3e139a4aa2c9f495e0dda05cadbfb363d09789c79d9580
-
SSDEEP
3072:aP3vSx4xqaFfxn8FsgJGfVUQh0rawbZn5LOTX0M/9AXe:aP/u2qaFfxn8FTGfNXwR5LOTkM/9AXe
Malware Config
Signatures
-
Contacts a large (23364) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 705 sh 719 chmod -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local 0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 701 0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf/tmp/0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf1⤵
- Modifies rc script
- Changes its process name
PID:701 -
/bin/sh/bin/sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:705 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:707
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:713
-
-
/usr/bin/mvmv /tmp/0567baebbff7c5e8bc3363bf281e157fa78fc9d1ec1519ebe63a3f534d0806e8.elf bin/busybox3⤵
- Reads runtime system information
PID:715
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:719
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95B
MD5ea1dfdca9880b1a10b7368aa0dfe2aef
SHA1b945ec5d90fc07016b606cc10651203d058bfe88
SHA256fb51f4b2f2f0c8eadb95244b3a602d1355de8e4d578375dd7736effa1501fb1a
SHA5123a4fc8238729102268cff2a88f7ce0d3424a0739a94feb33b725d2f54dca8659427c9f393a1782f16a06e752bfca4e98e761427bb7ef90f4fbfeacbedd0b7b47