Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    18/08/2023, 15:00

General

  • Target

    367-1-0x00008000-0x00026464-memory.dmp

  • Size

    76KB

  • MD5

    2573b5380400d75ce6df62c677695fb7

  • SHA1

    caa6cea4450bc3d93d54dc7395932442d4768885

  • SHA256

    4cc49fd48943363191e92cd1f591a8b7e12293a6ae2c4cbe71d1b80f2cc49830

  • SHA512

    09e0479e254c3bea3655ee2c47a75fe5bd36dc4a899e6777226ad893acf6d3342cc97ccf278e5cecf54bfb238e4a042d99195e63fd0bf55b82c957d1f55d880f

  • SSDEEP

    1536:TJnF9sFw8gu6+wyKaw1KpIPrbvr/6Ra1styKtI8ll5BihwlTQP+8oN:RowpuQyNSG2eRa1styK9flTQPHo

Score
9/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 10 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/367-1-0x00008000-0x00026464-memory.dmp
    /tmp/367-1-0x00008000-0x00026464-memory.dmp
    1⤵
      PID:368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads