Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
23-12-2024 17:06
Behavioral task
behavioral1
Sample
jackmyarmv4tl.elf
Resource
debian12-armhf-20240221-en
debian-12-armhf
2 signatures
150 seconds
General
-
Target
jackmyarmv4tl.elf
-
Size
166KB
-
MD5
8701802700912d0bc573d75d76bf4d30
-
SHA1
bcf66b86849b6c6a5977a102c67737723d9ace0d
-
SHA256
d338bd034f546e5756e2ebb0def390b32a13565a10e821ca8eee2eaa5468c07f
-
SHA512
74bd2a2a81f2dec0fa278d1aa02bfa20be97884fb7ccd2ccf4aaf2dfa07cbcc5314f7d1125c730a5209ef3abbeec7cc9e672fe32e8359522c9487f28f8bd5c7f
-
SSDEEP
3072:MqdR8ML89raonajuog68FiFL85hDnRF6ubfxmfQOYbr5Wn:jtArayajJFL85htF6OxmfQOYbr5Wn
Score
6/10
Malware Config
Signatures
-
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route jackmyarmv4tl.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route jackmyarmv4tl.elf