Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-01-2025 21:56

General

  • Target

    ssb.elf

  • Size

    121KB

  • MD5

    8d1eeb9625c13d477f0e32cef54fa48e

  • SHA1

    f2dfd75b6867d1cd80a9ac3c992522af020eb5f9

  • SHA256

    8229fbb71847846c8bcb710f31e40f33cf18902c2f44df43ef7dea59b546848a

  • SHA512

    6bfe15810cab78c69ce6e1432b905b68cfcca3db52042ae8611ecdf59ebe7616bcca9e8126c115f70e7f684966987b1d3df2ee719f8e89d151688d1208d9f2b1

  • SSDEEP

    3072:W/cpZ7oB+UAx1DdpU2bsJWCd2BmPI6aQasyKf1vRe:i6UA1pU2bwWGkmPI6aQasyKf1vRe

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/ssb.elf
    /tmp/ssb.elf
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:666

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads