Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    27-12-2024 02:22

General

  • Target

    660bf30d709b73be5c96fc420bf5fcc4fae0e1e3d92c5b5b426a493c3fd55871.elf

  • Size

    130KB

  • MD5

    ef25ee5832d50df5636d3689eacdaea9

  • SHA1

    8ad48f46073059650dbe277dcff0a427ceb6af71

  • SHA256

    660bf30d709b73be5c96fc420bf5fcc4fae0e1e3d92c5b5b426a493c3fd55871

  • SHA512

    fd804f9f4edf85a24e3425ec462f15bab2b8b526ad28604993176998abefcea037b8a69a09427e9a1174b928619ab28293c1c5a1dee4ef937da688e0bc0dfa4b

  • SSDEEP

    1536:UFKdzElm18uZJNb4ArFa8eAZHk4VB7fzTTr71igYSvGueqZvd2UlqKwyw6RNPYTx:UFKp50UU8e947Lb71izSftBdRalKM

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Traces itself 2 IoCs

    Traces itself to prevent debugging attempts

  • Changes its process name 1 IoCs
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/660bf30d709b73be5c96fc420bf5fcc4fae0e1e3d92c5b5b426a493c3fd55871.elf
    /tmp/660bf30d709b73be5c96fc420bf5fcc4fae0e1e3d92c5b5b426a493c3fd55871.elf
    1⤵
    • Deletes itself
    • Traces itself
    • Changes its process name
    • Writes file to tmp directory
    PID:648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads