Analysis

  • max time kernel
    145s
  • max time network
    133s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-01-2025 07:52

General

  • Target

    y.elf

  • Size

    114KB

  • MD5

    1411e0bacb1ac56f9edf16957c546053

  • SHA1

    7fc4f176fca6c238d5a8119efa6a1b85e543464f

  • SHA256

    d44134f23992a676ebb950df914e852bf32036f9cc5189f856c72e87b6672b92

  • SHA512

    f7f9ee3815728ea475785c481b2c330a25990b1b60ab8f4142c5923c020a66822fef2686e1c8b8fbd6a1c5e99e7d1ff61b14dc5591127be23a053fd2e6c4e0f2

  • SSDEEP

    3072:+/cpZmWwuQlftAIz2mqFbnzQUjPDm7XL7Q+cDNfD3Re:K2QlG7mqFbzvj7m7XL7Q+cDNfD3Re

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/y.elf
    /tmp/y.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:645

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads