Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
13-01-2025 09:32
Behavioral task
behavioral1
Sample
elitebotnet.arm5.elf
Resource
debian9-armhf-20240611-en
General
-
Target
elitebotnet.arm5.elf
-
Size
77KB
-
MD5
1a8ac15cffc6f1ab25caa7ca23c599fb
-
SHA1
1248e962ceabb211c8869217e366823450a4e0e3
-
SHA256
2bafad36c4095ee53cc479cf621e250ae83113f502f964229359f3ef5e83ee10
-
SHA512
17205d97399216409583627e54e44c61b8989ac92f3de53aa072c83eba3c77224de6e1121de16a18f3ce3e962a2e4c3b21949ae76a76c61a589bf7da655f47db
-
SSDEEP
1536:aODrgViG5ZK5HK4jP72INeqshQKapV5bPQVzAvwbZnN:aODrgdMj7NeqSQKAbcAvwbZnN
Malware Config
Signatures
-
Contacts a large (23033) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 650 sh 662 chmod -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local elitebotnet.arm5.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 649 elitebotnet.arm5.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/elitebotnet.arm5.elf/tmp/elitebotnet.arm5.elf1⤵
- Modifies rc script
- Changes its process name
PID:649 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/elitebotnet.arm5.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:650 -
/bin/rmrm -rf bin/busybox3⤵PID:651
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:654
-
-
/bin/mvmv /tmp/elitebotnet.arm5.elf bin/busybox3⤵
- Reads runtime system information
PID:660
-
-
/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:662
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD54b6879140e52fbe7db2b19ed17257289
SHA1eae5c280884c94f4ccf32c28daf35bc5bf7450a3
SHA2565f7fcb731652c445d5087088154f690c89443715a65b1cbdb78cf70ab3370931
SHA512736545b3ce791eb8b7402ffe064f66069abd9601039ae0c62eed71540fd14d95acf2dc7c27d5ebf451314c4de1220923901b6eb60098881e1709209fae45d7cc