Analysis
-
max time kernel
107s -
max time network
146s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
23/02/2025, 02:04
Behavioral task
behavioral1
Sample
10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf
Resource
debian12-armhf-20240221-en
General
-
Target
10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf
-
Size
176KB
-
MD5
2b53d328406f21f18f0930ce47556dca
-
SHA1
becfbb4b3a4c072f51e0080922de28aebeb3ef71
-
SHA256
10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e
-
SHA512
81107e7c660809fde0c6740412a2570b9275d0024cef2766fe2f730d4391c709fcf76e5d06aa8162bd6a43eb9dd8700de09151610147037a75443bf75bb6db0e
-
SSDEEP
3072:NBx2mxpI1Tzhm4yjeBaHX2b+/h81pNV2OnZW5hBL22WJV70+w2mowhbRWz3e:NJCBaHX2bE81sOng5hBL22WJV70p2mo8
Malware Config
Signatures
-
description ioc Process File deleted /var/log/audit/audit.log rm -
Deletes itself 1 IoCs
pid Process 705 10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf -
Deletes journal logs 1 TTPs 4 IoCs
Deletes systemd journal logs. Likely to evade detection.
description ioc Process File deleted /var/log/journal/65779e181e584f059cb9deb1099989c3/system.journal rm File deleted /var/log/journal/65779e181e584f059cb9deb1099989c3/[email protected]~ rm File deleted /var/log/journal/65779e181e584f059cb9deb1099989c3/system@a0c3e34424be4b6c8d58984d0e1a7645-000000000000040e-000611df8b853037.journal rm File deleted /var/log/journal/65779e181e584f059cb9deb1099989c3 rm -
Flushes firewall rules 1 TTPs 6 IoCs
Flushes/ disables firewall rules inside the Linux kernel.
pid Process 772 iptables 773 iptables 775 systemctl 775 systemctl 775 systemctl 775 systemctl -
Writes DNS configuration 1 TTPs 1 IoCs
Writes data to DNS resolver config file.
description ioc Process File opened for modification /etc/resolv.conf 10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf -
Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs
Abuse sudo or cached sudo credentials to execute code.
pid Process 712 rm -
description ioc Process File deleted /var/log/dpkg.log rm File deleted /var/log/exim4 rm File deleted /var/log/apt/term.log rm File deleted /var/log/faillog rm File deleted /var/log/installer/cdebconf/questions.dat rm File deleted /var/log/installer/hardware-summary rm File deleted /var/log/exim4/mainlog rm File deleted /var/log/README rm File deleted /var/log/runit rm File deleted /var/log/installer/cdebconf rm File deleted /var/log/alternatives.log rm File deleted /var/log/btmp rm File deleted /var/log/fontconfig.log rm File deleted /var/log/installer/firmware-summary rm File deleted /var/log/audit rm File deleted /var/log/private rm File deleted /var/log/lastlog rm File deleted /var/log/runit/ssh rm File deleted /var/log/wtmp rm File deleted /var/log/installer/cdebconf/templates.dat rm File deleted /var/log/installer/syslog rm File deleted /var/log/installer/status rm File deleted /var/log/wtmp rm File deleted /var/log/installer/lsb-release rm File deleted /var/log/journal rm File deleted /var/log/installer/partman rm File deleted /var/log/installer rm File deleted /var/log/apt/eipp.log.xz rm File deleted /var/log/apt/history.log rm File deleted /var/log/apt rm -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route 10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ksmumdcks 705 10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route 10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf -
Command and Scripting Interpreter: Unix Shell 1 TTPs 13 IoCs
Execute scripts via Unix Shell.
pid Process 747 sh 749 sh 750 sh 752 sh 770 sh 774 sh 710 sh 745 sh 754 sh 756 sh 790 sh 792 sh 743 sh -
description ioc Process File opened for reading /proc/11/cgroup pkill File opened for reading /proc/26/stat pkill File opened for reading /proc/143/status pkill File opened for reading /proc/683/ctty pkill File opened for reading /proc/22/cgroup pkill File opened for reading /proc/641/ctty pkill File opened for reading /proc/23/status pkill File opened for reading /proc/342/status pkill File opened for reading /proc/22/cgroup pkill File opened for reading /proc/3/ctty pkill File opened for reading /proc/2/cmdline pkill File opened for reading /proc/641/cgroup pkill File opened for reading /proc/703/cgroup pkill File opened for reading /proc/12/ctty pkill File opened for reading /proc/35/status pkill File opened for reading /proc/265/status pkill File opened for reading /proc/7/cmdline pkill File opened for reading /proc/46/stat pkill File opened for reading /proc/8/cgroup pkill File opened for reading /proc/350/cmdline pkill File opened for reading /proc/324/cgroup pkill File opened for reading /proc/708/ctty pkill File opened for reading /proc/5/cmdline pkill File opened for reading /proc/23/status pkill File opened for reading /proc/476/stat pkill File opened for reading /proc/14/ctty pkill File opened for reading /proc/324/ctty pkill File opened for reading /proc/10/stat pkill File opened for reading /proc/11/ctty pkill File opened for reading /proc/29/stat pkill File opened for reading /proc/74/ctty pkill File opened for reading /proc/14/status pkill File opened for reading /proc/19/cgroup pkill File opened for reading /proc/347/cgroup pkill File opened for reading /proc/22/stat pkill File opened for reading /proc/3/cgroup pkill File opened for reading /proc/28/ctty pkill File opened for reading /proc/33/ctty pkill File opened for reading /proc/350/ctty pkill File opened for reading /proc/683/stat pkill File opened for reading /proc/15/ctty pkill File opened for reading /proc/27/cgroup pkill File opened for reading /proc/323/status pkill File opened for reading /proc/23/stat pkill File opened for reading /proc/24/stat pkill File opened for reading /proc/679/cmdline pkill File opened for reading /proc/21/stat pkill File opened for reading /proc/11/stat pkill File opened for reading /proc/32/status pkill File opened for reading /proc/38/status pkill File opened for reading /proc/750/stat pkill File opened for reading /proc/25/stat pkill File opened for reading /proc/683/ctty pkill File opened for reading /proc/10/cgroup pkill File opened for reading /proc/16/stat pkill File opened for reading /proc/29/status pkill File opened for reading /proc/741/stat pkill File opened for reading /proc/1/cmdline pkill File opened for reading /proc/13/ctty pkill File opened for reading /proc/298/ctty pkill File opened for reading /proc/641/cgroup pkill File opened for reading /proc/33/stat pkill File opened for reading /proc/478/cmdline pkill File opened for reading /proc/9/stat pkill -
System Network Configuration Discovery 1 TTPs 4 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 749 sh 756 sh 757 service 770 sh
Processes
-
/tmp/10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf/tmp/10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf1⤵
- Deletes itself
- Writes DNS configuration
- Reads system routing table
- Changes its process name
- Reads system network configuration
PID:705 -
/bin/sh/bin/sh -c "rm -rf /tmp/* /var/* /var/run/* /var/tmp/*"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:710 -
/usr/bin/rmrm -rf /tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-ntpsec.service-Ei8HsY /tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-logind.service-c0NG3V /tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-timedated.service-qFRlRt /var/backups /var/cache /var/lib /var/local /var/lock /var/log /var/mail /var/opt /var/run /var/spool /var/tmp /var/run/atd.pid /var/run/auditd.pid /var/run/console-setup /var/run/credentials /var/run/crond.pid /var/run/crond.reboot /var/run/dbus /var/run/dhclient.eth0.pid /var/run/exim4 /var/run/initctl /var/run/initramfs /var/run/lock /var/run/log /var/run/motd.dynamic /var/run/mount /var/run/network /var/run/ntpd.pid /var/run/sendsigs.omit.d /var/run/shm /var/run/sshd /var/run/sshd.pid /var/run/sudo /var/run/systemd /var/run/tmpfiles.d /var/run/udev /var/run/user /var/run/utmp /var/tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-ntpsec.service-iFfB2h /var/tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-logind.service-og9QQ5 /var/tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-timedated.service-izmYxL3⤵
- Deletes Audit logs
- Deletes journal logs
- Abuse Elevation Control Mechanism: Sudo and Sudo Caching
- Deletes log files
PID:712
-
-
-
/bin/sh/bin/sh -c "rm -rf /var/log/wtmp"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:743 -
/usr/bin/rmrm -rf /var/log/wtmp3⤵
- Deletes log files
PID:744
-
-
-
/bin/sh/bin/sh -c "rm -rf /tmp/*"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:745 -
/usr/bin/rmrm -rf "/tmp/*"3⤵PID:746
-
-
-
/bin/sh/bin/sh -c "rm -rf /bin/netstat"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:747 -
/usr/bin/rmrm -rf /bin/netstat3⤵PID:748
-
-
-
/bin/sh/bin/sh -c "iptables -F"2⤵
- Command and Scripting Interpreter: Unix Shell
- System Network Configuration Discovery
PID:749
-
-
/bin/sh/bin/sh -c "pkill -9 busybox"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:750 -
/usr/bin/pkillpkill -9 busybox3⤵
- Reads runtime system information
PID:751
-
-
-
/bin/sh/bin/sh -c "pkill -9 perl"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:752 -
/usr/bin/pkillpkill -9 perl3⤵
- Reads runtime system information
PID:753
-
-
-
/bin/sh/bin/sh -c "pkill -9 python"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:754 -
/usr/bin/pkillpkill -9 python3⤵
- Reads runtime system information
PID:755
-
-
-
/bin/sh/bin/sh -c "service iptables stop"2⤵
- Command and Scripting Interpreter: Unix Shell
- System Network Configuration Discovery
PID:756 -
/usr/sbin/serviceservice iptables stop3⤵
- System Network Configuration Discovery
PID:757 -
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:758
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:759
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:762
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵PID:761
-
-
-
/usr/local/sbin/systemctlsystemctl stop iptables.service3⤵PID:757
-
-
/usr/local/bin/systemctlsystemctl stop iptables.service3⤵PID:757
-
-
/usr/sbin/systemctlsystemctl stop iptables.service3⤵PID:757
-
-
/usr/bin/systemctlsystemctl stop iptables.service3⤵PID:757
-
-
-
/bin/sh/bin/sh -c "/sbin/iptables -F; /sbin/iptables -X"2⤵
- Command and Scripting Interpreter: Unix Shell
- System Network Configuration Discovery
PID:770 -
/sbin/iptables/sbin/iptables -F3⤵
- Flushes firewall rules
PID:772
-
-
/sbin/iptables/sbin/iptables -X3⤵
- Flushes firewall rules
PID:773
-
-
-
/bin/sh/bin/sh -c "service firewalld stop"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:774 -
/usr/sbin/serviceservice firewalld stop3⤵PID:775
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:776
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:778
-
-
/usr/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵PID:781
-
-
/usr/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:782
-
-
-
/usr/local/sbin/systemctlsystemctl stop firewalld.service3⤵
- Flushes firewall rules
PID:775
-
-
/usr/local/bin/systemctlsystemctl stop firewalld.service3⤵
- Flushes firewall rules
PID:775
-
-
/usr/sbin/systemctlsystemctl stop firewalld.service3⤵
- Flushes firewall rules
PID:775
-
-
/usr/bin/systemctlsystemctl stop firewalld.service3⤵
- Flushes firewall rules
PID:775
-
-
-
/bin/sh/bin/sh -c "rm -rf ~/.bash_history"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:790 -
/usr/bin/rmrm -rf "~/.bash_history"3⤵PID:791
-
-
-
/bin/sh/bin/sh -c "history -c"2⤵
- Command and Scripting Interpreter: Unix Shell
PID:792
-