Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    17-12-2024 03:25

General

  • Target

    7a26cd5ac3f06cb835dd8cd58306dca3445c540a7f1be3414f1f2948a17d4926.elf

  • Size

    126KB

  • MD5

    3a097fcfda87360edda1b32bc957f991

  • SHA1

    315ee072ad283f2fcd9a075ddf2ffa205f7044f3

  • SHA256

    7a26cd5ac3f06cb835dd8cd58306dca3445c540a7f1be3414f1f2948a17d4926

  • SHA512

    c9686d5fa5448ce73864e3d14f5da7ecb6b3ce9ca04f3fb741c861e616b0da13e364a9b7fa93022dc420069f4c25a8a9541dd2e01b1c44ea647b6743837b7817

  • SSDEEP

    1536:p/Ka0rG5yC/cMChygtVOBdWFAcJX4VlgXTAXYFkWUGZrSo51WhrV1l3GwywEReQa:ZKaprMh7TOXWFh4UXcYFkWpZlvWNUmI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Traces itself 2 IoCs

    Traces itself to prevent debugging attempts

  • Changes its process name 1 IoCs
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/7a26cd5ac3f06cb835dd8cd58306dca3445c540a7f1be3414f1f2948a17d4926.elf
    /tmp/7a26cd5ac3f06cb835dd8cd58306dca3445c540a7f1be3414f1f2948a17d4926.elf
    1⤵
    • Deletes itself
    • Traces itself
    • Changes its process name
    • Writes file to tmp directory
    PID:641

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads