Analysis
-
max time kernel
149s -
max time network
160s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14-01-2025 03:28
Behavioral task
behavioral1
Sample
e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf
Resource
debian9-armhf-20240611-en
General
-
Target
e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf
-
Size
161KB
-
MD5
5da389660793a2131957f0c21a26b502
-
SHA1
5e1b40b9e9ca1ca9327e43a1f4c9fa54a48305a2
-
SHA256
e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f
-
SHA512
31fda13ebc592e776b4996adce007628456da4977ef5f9a33ae7e91b3a398fda7999c4ab43350f634873ed5cd7e593c05f1b9629ceb1d5ee81fff56e66e11636
-
SSDEEP
3072:a83ASxrlDxiaNfxn8FsUpSfRUQh037wbZn5DOTX0M/9ETXe:a8QuxliaNfxn8FvSf56wR5DOTkM/9YXe
Malware Config
Signatures
-
Contacts a large (23833) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 651 sh 663 chmod -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 650 e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf/tmp/e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf1⤵
- Modifies rc script
- Changes its process name
PID:650 -
/bin/sh/bin/sh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:651 -
/bin/rmrm -rf bin/systemd3⤵PID:653
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:654
-
-
/bin/mvmv /tmp/e2cd2182e7b24c400e8c9f0325b8fd66fc420d00e23973277efc4af3a5af206f.elf bin/systemd3⤵
- Reads runtime system information
PID:657
-
-
/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:663
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD54b6879140e52fbe7db2b19ed17257289
SHA1eae5c280884c94f4ccf32c28daf35bc5bf7450a3
SHA2565f7fcb731652c445d5087088154f690c89443715a65b1cbdb78cf70ab3370931
SHA512736545b3ce791eb8b7402ffe064f66069abd9601039ae0c62eed71540fd14d95acf2dc7c27d5ebf451314c4de1220923901b6eb60098881e1709209fae45d7cc