Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
17-12-2024 02:03
Behavioral task
behavioral1
Sample
063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf
Resource
debian12-armhf-20240418-en
debian-12-armhf
4 signatures
150 seconds
General
-
Target
063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf
-
Size
177KB
-
MD5
c9e4d040ac334cf292d6722e990dec72
-
SHA1
7a512195c809dd528d78a287fabd45a7b3549908
-
SHA256
063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e
-
SHA512
be2bc0d483d7ab6201ec8aa82f820336f76becc3373f55faa0d3e50d7fdd84e0757d4b2fb184d71a99c87783849e397e249a933a1d0fecc44a5b893ef679626b
-
SSDEEP
3072:OLe6vhfZQIvuCeeuaMuTuRez43IVILmZQy38YhTfYo+M/RgDlplLn:ee6vheIv1ruaMuTuReErLm738+x+M/Ro
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 704 063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf -
Traces itself 2 IoCs
Traces itself to prevent debugging attempts
pid Process 704 063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf 705 063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself httpd 704 063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf 063df03a11c49bced119c245f4cb77f8b0662e02d403ca9b7e5ceed94efcae0e.elf