Analysis
-
max time kernel
1s -
max time network
9s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
31-12-2024 07:47
Behavioral task
behavioral1
Sample
chernobyl.mipsel.elf
Resource
debian12-mipsel-20240221-en
debian-12-mipsel
3 signatures
150 seconds
General
-
Target
chernobyl.mipsel.elf
-
Size
149KB
-
MD5
09fbd6192532776bf8dee1f50c3ff4ba
-
SHA1
0993f366564ca42aebde6f745ce9c89b2589b142
-
SHA256
419ec6de1da8f5e5e7b045bba9d3476e47ce5e754dee3e82bf0c77061038bacc
-
SHA512
fb929af1bb9de820d0c05ca8ede19822f386fb03c47efb94897f97580b6930448817b96faed7a6bde2236e11bbdfc670b89994346f9a413cf94365d58bb8d606
-
SSDEEP
3072:8nhw98IodlYfe+MTNC60nmY8sUFmujymeYBn3:8nhw98HMBG6X85FmujymtBn3
Score
6/10
Malware Config
Signatures
-
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route chernobyl.mipsel.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route chernobyl.mipsel.elf -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 743 chernobyl.mipsel.elf