Analysis

  • max time kernel
    107s
  • max time network
    146s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    23/02/2025, 02:04

General

  • Target

    10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf

  • Size

    176KB

  • MD5

    2b53d328406f21f18f0930ce47556dca

  • SHA1

    becfbb4b3a4c072f51e0080922de28aebeb3ef71

  • SHA256

    10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e

  • SHA512

    81107e7c660809fde0c6740412a2570b9275d0024cef2766fe2f730d4391c709fcf76e5d06aa8162bd6a43eb9dd8700de09151610147037a75443bf75bb6db0e

  • SSDEEP

    3072:NBx2mxpI1Tzhm4yjeBaHX2b+/h81pNV2OnZW5hBL22WJV70+w2mowhbRWz3e:NJCBaHX2bE81sOng5hBL22WJV70p2mo8

Malware Config

Signatures

  • Deletes Audit logs 1 TTPs 1 IoCs

    Deletes logs related to the Linux Audit framework.

  • Deletes itself 1 IoCs
  • Deletes journal logs 1 TTPs 4 IoCs

    Deletes systemd journal logs. Likely to evade detection.

  • Flushes firewall rules 1 TTPs 6 IoCs

    Flushes/ disables firewall rules inside the Linux kernel.

  • Writes DNS configuration 1 TTPs 1 IoCs

    Writes data to DNS resolver config file.

  • Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 TTPs 1 IoCs

    Abuse sudo or cached sudo credentials to execute code.

  • Deletes log files 1 TTPs 30 IoCs

    Deletes log files on the system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Command and Scripting Interpreter: Unix Shell 1 TTPs 13 IoCs

    Execute scripts via Unix Shell.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 4 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf
    /tmp/10962293ec817a48997b8d2c9e4a43610373a35fe7360937f261e5d278fdef7e.elf
    1⤵
    • Deletes itself
    • Writes DNS configuration
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    PID:705
    • /bin/sh
      /bin/sh -c "rm -rf /tmp/* /var/* /var/run/* /var/tmp/*"
      2⤵
      • Command and Scripting Interpreter: Unix Shell
      PID:710
      • /usr/bin/rm
        rm -rf /tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-ntpsec.service-Ei8HsY /tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-logind.service-c0NG3V /tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-timedated.service-qFRlRt /var/backups /var/cache /var/lib /var/local /var/lock /var/log /var/mail /var/opt /var/run /var/spool /var/tmp /var/run/atd.pid /var/run/auditd.pid /var/run/console-setup /var/run/credentials /var/run/crond.pid /var/run/crond.reboot /var/run/dbus /var/run/dhclient.eth0.pid /var/run/exim4 /var/run/initctl /var/run/initramfs /var/run/lock /var/run/log /var/run/motd.dynamic /var/run/mount /var/run/network /var/run/ntpd.pid /var/run/sendsigs.omit.d /var/run/shm /var/run/sshd /var/run/sshd.pid /var/run/sudo /var/run/systemd /var/run/tmpfiles.d /var/run/udev /var/run/user /var/run/utmp /var/tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-ntpsec.service-iFfB2h /var/tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-logind.service-og9QQ5 /var/tmp/systemd-private-42fdf8ff7084457286f83c80f13f6238-systemd-timedated.service-izmYxL
        3⤵
        • Deletes Audit logs
        • Deletes journal logs
        • Abuse Elevation Control Mechanism: Sudo and Sudo Caching
        • Deletes log files
        PID:712
    • /bin/sh
      /bin/sh -c "rm -rf /var/log/wtmp"
      2⤵
      • Command and Scripting Interpreter: Unix Shell
      PID:743
      • /usr/bin/rm
        rm -rf /var/log/wtmp
        3⤵
        • Deletes log files
        PID:744
    • /bin/sh
      /bin/sh -c "rm -rf /tmp/*"
      2⤵
      • Command and Scripting Interpreter: Unix Shell
      PID:745
      • /usr/bin/rm
        rm -rf "/tmp/*"
        3⤵
          PID:746
      • /bin/sh
        /bin/sh -c "rm -rf /bin/netstat"
        2⤵
        • Command and Scripting Interpreter: Unix Shell
        PID:747
        • /usr/bin/rm
          rm -rf /bin/netstat
          3⤵
            PID:748
        • /bin/sh
          /bin/sh -c "iptables -F"
          2⤵
          • Command and Scripting Interpreter: Unix Shell
          • System Network Configuration Discovery
          PID:749
        • /bin/sh
          /bin/sh -c "pkill -9 busybox"
          2⤵
          • Command and Scripting Interpreter: Unix Shell
          PID:750
          • /usr/bin/pkill
            pkill -9 busybox
            3⤵
            • Reads runtime system information
            PID:751
        • /bin/sh
          /bin/sh -c "pkill -9 perl"
          2⤵
          • Command and Scripting Interpreter: Unix Shell
          PID:752
          • /usr/bin/pkill
            pkill -9 perl
            3⤵
            • Reads runtime system information
            PID:753
        • /bin/sh
          /bin/sh -c "pkill -9 python"
          2⤵
          • Command and Scripting Interpreter: Unix Shell
          PID:754
          • /usr/bin/pkill
            pkill -9 python
            3⤵
            • Reads runtime system information
            PID:755
        • /bin/sh
          /bin/sh -c "service iptables stop"
          2⤵
          • Command and Scripting Interpreter: Unix Shell
          • System Network Configuration Discovery
          PID:756
          • /usr/sbin/service
            service iptables stop
            3⤵
            • System Network Configuration Discovery
            PID:757
            • /usr/bin/basename
              basename /usr/sbin/service
              4⤵
                PID:758
              • /usr/bin/basename
                basename /usr/sbin/service
                4⤵
                  PID:759
                • /usr/bin/sed
                  sed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"
                  4⤵
                    PID:762
                  • /usr/bin/systemctl
                    systemctl list-unit-files --full "--type=socket"
                    4⤵
                      PID:761
                  • /usr/local/sbin/systemctl
                    systemctl stop iptables.service
                    3⤵
                      PID:757
                    • /usr/local/bin/systemctl
                      systemctl stop iptables.service
                      3⤵
                        PID:757
                      • /usr/sbin/systemctl
                        systemctl stop iptables.service
                        3⤵
                          PID:757
                        • /usr/bin/systemctl
                          systemctl stop iptables.service
                          3⤵
                            PID:757
                        • /bin/sh
                          /bin/sh -c "/sbin/iptables -F; /sbin/iptables -X"
                          2⤵
                          • Command and Scripting Interpreter: Unix Shell
                          • System Network Configuration Discovery
                          PID:770
                          • /sbin/iptables
                            /sbin/iptables -F
                            3⤵
                            • Flushes firewall rules
                            PID:772
                          • /sbin/iptables
                            /sbin/iptables -X
                            3⤵
                            • Flushes firewall rules
                            PID:773
                        • /bin/sh
                          /bin/sh -c "service firewalld stop"
                          2⤵
                          • Command and Scripting Interpreter: Unix Shell
                          PID:774
                          • /usr/sbin/service
                            service firewalld stop
                            3⤵
                              PID:775
                              • /usr/bin/basename
                                basename /usr/sbin/service
                                4⤵
                                  PID:776
                                • /usr/bin/basename
                                  basename /usr/sbin/service
                                  4⤵
                                    PID:778
                                  • /usr/bin/systemctl
                                    systemctl list-unit-files --full "--type=socket"
                                    4⤵
                                      PID:781
                                    • /usr/bin/sed
                                      sed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"
                                      4⤵
                                        PID:782
                                    • /usr/local/sbin/systemctl
                                      systemctl stop firewalld.service
                                      3⤵
                                      • Flushes firewall rules
                                      PID:775
                                    • /usr/local/bin/systemctl
                                      systemctl stop firewalld.service
                                      3⤵
                                      • Flushes firewall rules
                                      PID:775
                                    • /usr/sbin/systemctl
                                      systemctl stop firewalld.service
                                      3⤵
                                      • Flushes firewall rules
                                      PID:775
                                    • /usr/bin/systemctl
                                      systemctl stop firewalld.service
                                      3⤵
                                      • Flushes firewall rules
                                      PID:775
                                  • /bin/sh
                                    /bin/sh -c "rm -rf ~/.bash_history"
                                    2⤵
                                    • Command and Scripting Interpreter: Unix Shell
                                    PID:790
                                    • /usr/bin/rm
                                      rm -rf "~/.bash_history"
                                      3⤵
                                        PID:791
                                    • /bin/sh
                                      /bin/sh -c "history -c"
                                      2⤵
                                      • Command and Scripting Interpreter: Unix Shell
                                      PID:792

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads