Analysis

  • max time kernel
    145s
  • max time network
    138s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    05-01-2025 07:47

General

  • Target

    s.elf

  • Size

    135KB

  • MD5

    09748a86923870171d1821e84a4ae778

  • SHA1

    b583e96c59f11380bf6286904cb925c279f16378

  • SHA256

    ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c

  • SHA512

    9b2cc8d791b76c901c290792161b104ea006587bb5b4d6d9595327c269c0c9bda02bbe0bd215fd1e916f029eea7a66a0c05b9fd157313b46f43e111eeee05fb6

  • SSDEEP

    3072:sh+Radi7iaPw5388shgZl1pzqcZRQNeN0eaLmhxQu72m/RZ:qXaPw5Rl1pzqY0eaLmhxQu72m/RZ

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/s.elf
    /tmp/s.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:703

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads