Analysis
-
max time kernel
150s -
max time network
164s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
07/03/2025, 18:33
Behavioral task
behavioral1
Sample
231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a
Resource
debian12-armhf-20240221-en
General
-
Target
231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a
-
Size
178KB
-
MD5
8d6f54d0a32a19f067852e359f24c615
-
SHA1
c5800fa33eab7ba08c239ca5fb24f01e0d541dc7
-
SHA256
231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a
-
SHA512
8940ae51e0a6e3dea0709a7694497e78bd6eb4b45d5fe4498734bbc3d59aaf86c6b28f0fee182ee60056fddc9e12677d6f0aad649cb76ca9204322762d1679c5
-
SSDEEP
3072:rYufNoam9juxCJMzHoabXryoLpaquQ+mhDhft7bwbZnlyOW7/M/9AKfzsL:EucsWKoabXryoLfuQ+wJwRlyOWrM/9Ap
Malware Config
Signatures
-
Contacts a large (175246) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 702 sh 717 chmod -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 699 231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a/tmp/231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a1⤵
- Changes its process name
PID:699 -
/bin/sh/bin/sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:702 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:705
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:710
-
-
/usr/bin/mvmv /tmp/231aa568e46b3216ef77807c40c6d8d809ef60cc6829d79ebf06513e900bdf5a bin/busybox3⤵
- Reads runtime system information
PID:714
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:717
-
-