Analysis
-
max time kernel
126s -
max time network
157s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
10-02-2025 22:07
Behavioral task
behavioral1
Sample
nklarm7.elf
Resource
debian12-armhf-20240221-en
General
-
Target
nklarm7.elf
-
Size
72KB
-
MD5
c8ba1406bbdf0a762644ec1eb79f1f95
-
SHA1
4c77cb4e6c88c4477c61fb8296e154979901a862
-
SHA256
12b6950a5105e5b3e4396ba1f84f4ede143da225cb7d33b12860742ed2bb12e7
-
SHA512
ebddc6ee098af6e9030cc027a746c646d298fb5244b693131d0cf9abf909610b2bee1a3643bafafc92c4897a00263c7f68c596796640ea68af45ebb98642b60b
-
SSDEEP
1536:JBnSqeBG3AXdo//H7vJv4oOhUX4yautS6yPimg9E9ljaiHHw6LR5:peA3z/fSoO6oyautS6yPimX7w6t
Malware Config
Signatures
-
Contacts a large (183599) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 712 nklarm7.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog nklarm7.elf File opened for modification /dev/misc/watchdog nklarm7.elf -
Renames itself 1 IoCs
pid Process 712 nklarm7.elf -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.158.108.203 -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 712 nklarm7.elf