Analysis
-
max time kernel
142s -
max time network
152s -
platform
debian-9_armhf -
resource
debian9-armhf-20231215-en -
resource tags
arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20-12-2023 16:47
Behavioral task
behavioral1
Sample
ecf2fbffa78bb130a11fe2ab3babf16b
Resource
debian9-armhf-20231215-en
General
-
Target
ecf2fbffa78bb130a11fe2ab3babf16b
-
Size
59KB
-
MD5
ecf2fbffa78bb130a11fe2ab3babf16b
-
SHA1
b2015bd750b4dda7aa407ed638252bae40ae6992
-
SHA256
3e9267429ae0f50f270842d677bf0b9f9c149c34ac021c5b3e17eea96ccff1dd
-
SHA512
2072d8f164af7bb38d221475cb0bc15a143ff5bc5022c4208e06f1aa15ecbd02d3d848aeaceb3ba9015eb2727c0ae0d8485ebfe5d1efaa068427efb763a38aad
-
SSDEEP
1536:dah3sb7XZX8VAz4m9hvPBpdmLyLFZs1mIQ0qnsrxt+hx:chcb7XZoAz4m9h3B2GLF+EIAnsrqr
Malware Config
Signatures
-
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 659 ecf2fbffa78bb130a11fe2ab3babf16b -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog ecf2fbffa78bb130a11fe2ab3babf16b File opened for modification /dev/misc/watchdog ecf2fbffa78bb130a11fe2ab3babf16b -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route ecf2fbffa78bb130a11fe2ab3babf16b -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route ecf2fbffa78bb130a11fe2ab3babf16b -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe ecf2fbffa78bb130a11fe2ab3babf16b