Analysis
-
max time kernel
102s -
max time network
154s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
19-02-2025 18:42
Behavioral task
behavioral1
Sample
arm.elf
Resource
debian9-armhf-20240611-en
General
-
Target
arm.elf
-
Size
77KB
-
MD5
009e48bb599ed80b52a8a5cc7bcdc975
-
SHA1
5dfd4288668490822d98968874b39ab63e7e244a
-
SHA256
f0b75ebd46b16f8a7b70027489bd12b1e350dc7386eddb1d85256482852deb37
-
SHA512
af89c62c424b234dddf41f547ffe8cb896dcd4744dc4e3712fc8a45fe9124a839a561fc7d0cabfb9aa91d035e8eb0952dcd3467422c71e9eca2677f86976fe82
-
SSDEEP
1536:Kl3kUVLABJQz6bMbru06RR8gTVYn83ahWnUuqpX5WzEF35mWG:Klt6Ag+n8qhoeXF39
Malware Config
Signatures
-
Contacts a large (194790) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog arm.elf File opened for modification /dev/misc/watchdog arm.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp arm.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself io5je3o121kpbkc2f50 646 arm.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp arm.elf -
description ioc Process File opened for reading /proc/653/exe arm.elf File opened for reading /proc/647/exe arm.elf