Analysis
-
max time kernel
140s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
09/03/2025, 11:29
Behavioral task
behavioral1
Sample
u.elf
Resource
debian9-mipsbe-20240729-en
4 signatures
150 seconds
General
-
Target
u.elf
-
Size
98KB
-
MD5
3eea77f7c9d0d77c405d684aa1e98d97
-
SHA1
528ac08a8ed9252217476deda1a5fcf39e361a87
-
SHA256
4889a50a764cd1bcfdf3ad77393910405e3dd682b9ba20eff8792592e9eabd12
-
SHA512
aad66c3984dfe55a44cb90802f0f993f0bc2676ae22bb0c1310e6da7a8d95dfa302dae501daef2a911b8b5b4e1e2e8c00cc3e1f450a0e95510dfc723eb5f9c05
-
SSDEEP
3072:ctH/Tlw/1J12lc5/v0MDMj827Ydza3/r3c3B0:YH/C/1Hd3Mj827Ydza3/YB0
Score
9/10
Malware Config
Signatures
-
Contacts a large (176348) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ����������������� 743 u.elf -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Ŏ��ŝ�������� u.elf File opened for modification /tmp/笭�祡��翩������� u.elf File opened for modification /tmp/Ŏ��Ŭ������۵��������� u.elf File opened for modification /tmp/笭�玜�������迩������� u.elf