Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20250410-en
  • resource tags

    arch:armhfimage:debian9-armhf-20250410-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    16/04/2025, 00:06

General

  • Target

    drea4.elf

  • Size

    153KB

  • MD5

    ffa590338ac87a1bd489be8d6df4d94f

  • SHA1

    49c73d34f4a3f249300096aa330bb80145b8975c

  • SHA256

    43abd8d0fec081d764c53b57b7223047bd8ad4e989a6281d4d54e50ad188a385

  • SHA512

    f57df1d80a7fd3c9a4b1489d92e28ee722740203f92d7c5a908e9e6bdf01f9e5f7c59ab40b8b229686565d18e17ef7509c34aac7220a27a194ad4b8945a74847

  • SSDEEP

    1536:Nr1aH42hB66LgARDhapvN1ipF629Az4VRO1rT+CAr+aaxR6O9+bRXViE1l2Ywywx:Nr1aFhM8DWbOF6P4mNfI+a8U1QG5Y

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads process memory 1 TTPs 43 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 3 IoCs

Processes

  • /tmp/drea4.elf
    /tmp/drea4.elf
    1⤵
    • Deletes itself
    • Reads process memory
    • Changes its process name
    PID:640

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads