Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    17-02-2025 10:03

General

  • Target

    kre4per.arm.elf

  • Size

    62KB

  • MD5

    f6afdcbcd5fa63180026542c1d431e9d

  • SHA1

    13922db0b825bb8ddef4ed653d35a98ef4e3f8b3

  • SHA256

    e33e98eb90c09ecc24ce81706969766930e24690b9ce7bd7770aaf43f73c8e2d

  • SHA512

    7241ac001a61ed4ba4e15966aa597dd5c4f0282a19fbd4113084dbea94d28b3b2cb9440e40b85991fca8d2838f0bbb089336ebec51907270cc42197e2a9a7502

  • SSDEEP

    1536:gP1IwP44TCRfNdbYakabDrzKQlG9Wcq8JJTId42+:gP7V4sazKUG9bqAJTQ

Malware Config

Signatures

  • Contacts a large (117351) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Changes its process name 1 IoCs

Processes

  • /tmp/kre4per.arm.elf
    /tmp/kre4per.arm.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    PID:643

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads