Analysis

  • max time kernel
    132s
  • max time network
    147s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    14/04/2025, 15:03

General

  • Target

    arm5.elf

  • Size

    148KB

  • MD5

    6e923d73f32e576fd967d78ce89c900b

  • SHA1

    11f8fb82effae80c4a2976ad7cffe37796a2f7f6

  • SHA256

    b3025deef3be69c42eab00fd6b4e184d4fda19293de1f979905f55eb6dd74ad0

  • SHA512

    abe41abd8bba184756e3096f31df4a1e6b0f37b24ec498eae6aa444c0e754d578bb76722c195a6dc855564b91bd2e91af4cfb45ccae3b34fa59d4e293185179a

  • SSDEEP

    1536:Doz/4sWkAHyE2nDth8WN5/2iVb4Vsy7TnRfC4c87EOiD/RLl5Rku+AlgewywdPCn:DozbxfDp5/p4X79fC4fURB5vBR5HB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads process memory 1 TTPs 42 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 3 IoCs

Processes

  • /tmp/arm5.elf
    /tmp/arm5.elf
    1⤵
    • Deletes itself
    • Reads process memory
    • Changes its process name
    PID:645

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads