Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10/03/2025, 01:09

General

  • Target

    592ba920d31c5214330403eb03344a270096e3a650771b240ec757859da40ecc.elf

  • Size

    177KB

  • MD5

    161b6afe1a25feb4f81f87e5b942107d

  • SHA1

    7e964bf38390cdfad031d88cdb2c31092274f4ff

  • SHA256

    592ba920d31c5214330403eb03344a270096e3a650771b240ec757859da40ecc

  • SHA512

    37ce46496c019dc1290c705d478fa3c12b9cbcf4b43feae943cfda5d50c64b5a573aa936f489f1401a8d0140aab31dc91e8a8f1340e3c23f9b79c39013c3f49b

  • SSDEEP

    3072:8Le6vh5G1QIruCee+asuTuRebU7IVILzZQe38YhTfYo+M/RzApthLn:0e6vfRIr1r+asuTuReAvLz/38+x+M/R+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Traces itself 2 IoCs

    Traces itself to prevent debugging attempts

  • Changes its process name 1 IoCs
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/592ba920d31c5214330403eb03344a270096e3a650771b240ec757859da40ecc.elf
    /tmp/592ba920d31c5214330403eb03344a270096e3a650771b240ec757859da40ecc.elf
    1⤵
    • Deletes itself
    • Traces itself
    • Changes its process name
    • Writes file to tmp directory
    PID:676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads