Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
17-02-2025 10:03
Behavioral task
behavioral1
Sample
kre4per.arm.elf
Resource
debian9-armhf-20240418-en
5 signatures
150 seconds
General
-
Target
kre4per.arm.elf
-
Size
62KB
-
MD5
f6afdcbcd5fa63180026542c1d431e9d
-
SHA1
13922db0b825bb8ddef4ed653d35a98ef4e3f8b3
-
SHA256
e33e98eb90c09ecc24ce81706969766930e24690b9ce7bd7770aaf43f73c8e2d
-
SHA512
7241ac001a61ed4ba4e15966aa597dd5c4f0282a19fbd4113084dbea94d28b3b2cb9440e40b85991fca8d2838f0bbb089336ebec51907270cc42197e2a9a7502
-
SSDEEP
1536:gP1IwP44TCRfNdbYakabDrzKQlG9Wcq8JJTId42+:gP7V4sazKUG9bqAJTQ
Score
9/10
Malware Config
Signatures
-
Contacts a large (117351) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog kre4per.arm.elf File opened for modification /dev/misc/watchdog kre4per.arm.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog kre4per.arm.elf File opened for modification /bin/watchdog kre4per.arm.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself tAshemABCgdzzldfgkrs 643 kre4per.arm.elf