Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    06-01-2025 03:19

General

  • Target

    ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf

  • Size

    135KB

  • MD5

    09748a86923870171d1821e84a4ae778

  • SHA1

    b583e96c59f11380bf6286904cb925c279f16378

  • SHA256

    ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c

  • SHA512

    9b2cc8d791b76c901c290792161b104ea006587bb5b4d6d9595327c269c0c9bda02bbe0bd215fd1e916f029eea7a66a0c05b9fd157313b46f43e111eeee05fb6

  • SSDEEP

    3072:sh+Radi7iaPw5388shgZl1pzqcZRQNeN0eaLmhxQu72m/RZ:qXaPw5Rl1pzqY0eaLmhxQu72m/RZ

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf
    /tmp/ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:669

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads