Analysis

  • max time kernel
    131s
  • max time network
    149s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-12-2024 17:36

General

  • Target

    njvwa4.elf

  • Size

    158KB

  • MD5

    881173edb59fafe1226bdb50fdb99c4b

  • SHA1

    0606321d9ce01653715a63b4cb574e6ab896c39b

  • SHA256

    5f1c421ed3ab639f03e7850408ba9753abaedd118d35089dbed0692ac455b7ab

  • SHA512

    64c838307f5a5e8c788a1c4e75edbab2d1574397786b4263ee4b96841ea4e77c666c95334605d1f516a2e840b40f14b3373a93cc212a1aad82701487b035f5f0

  • SSDEEP

    1536:ec8n+sXCFKtDnofa+0RXivAppBCAsmo4Vp7gTCU33qW53O/ly0iVu2L5lmlwywrG:ec8nlDo/02A7BCV4rgmU33zDnIWvTxs

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 1 IoCs
  • Reads runtime system information 55 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/njvwa4.elf
    /tmp/njvwa4.elf
    1⤵
    • Deletes itself
    • Changes its process name
    • Reads runtime system information
    PID:661

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads