Analysis

  • max time kernel
    145s
  • max time network
    141s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    05-01-2025 07:47

General

  • Target

    t.elf

  • Size

    172KB

  • MD5

    5eac14dfbadebe0e62d714bee8a873d0

  • SHA1

    51a2ef104a64a21edfbebe3f1294ed7bb3605b59

  • SHA256

    bfa0d7d433c1e0a5a89554d466294fc66bf83acc1b5284f6d9378f1870d4d642

  • SHA512

    79a0bf584ee548d34e775ee0e7f8e95b0167d275c430aa2f19bdcfcd88f32f6e6d4b90655911407b64b3c49906bf346ca8fb56b33b0b806f68d00de5afc86e5b

  • SSDEEP

    3072:L7EM1YSFQaDaV7r/OqZru7lt/CUnPD3MMM/9DsfGSfmUIwHyA/WRZ:R1QaDaV7r/RZIt/5nPD3/M/9DsOSfmUE

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/t.elf
    /tmp/t.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:705

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads