Analysis
-
max time kernel
149s -
max time network
148s -
platform
debian-9_armhf -
resource
debian9-armhf-20231222-en -
resource tags
arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
30/12/2023, 10:30
Behavioral task
behavioral1
Sample
15f94b7859688a477a9dca58a7c2e741
Resource
debian9-armhf-20231222-en
General
-
Target
15f94b7859688a477a9dca58a7c2e741
-
Size
68KB
-
MD5
15f94b7859688a477a9dca58a7c2e741
-
SHA1
0b433dbd3f40a4aa67dd49e45095a8e835834dba
-
SHA256
199ea02c2c6c0558a0a533b21d7065fdc9e3645d3d6524e4a6951521c3e20111
-
SHA512
a1a6dcadd102f42fbe53aae75d43a9053ebe84fb9774a035657adc8017cede200ab2d3de53dcd4691d66ac1bf1e864e7aec844c31dfbd160bfb7f222aa195a96
-
SSDEEP
1536:74blEKw06Z1XjuxfEQ2qm5YB8t46zHMGJok:74bllw0Wc0484EH7Jok
Malware Config
Signatures
-
Contacts a large (23510) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 681 15f94b7859688a477a9dca58a7c2e741 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads runtime system information 31 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/731/maps File opened for reading /proc/769/maps File opened for reading /proc/775/maps File opened for reading /proc/780/maps File opened for reading /proc/782/maps File opened for reading /proc/656/maps File opened for reading /proc/662/maps File opened for reading /proc/691/maps File opened for reading /proc/773/maps File opened for reading /proc/794/maps File opened for reading /proc/577/maps File opened for reading /proc/786/maps File opened for reading /proc/788/maps File opened for reading /proc/796/maps File opened for reading /proc/574/maps File opened for reading /proc/576/maps File opened for reading /proc/658/maps File opened for reading /proc/676/maps File opened for reading /proc/686/maps File opened for reading /proc/727/maps File opened for reading /proc/798/maps File opened for reading /proc/800/maps File opened for reading /proc/622/maps File opened for reading /proc/661/maps File opened for reading /proc/687/maps File opened for reading /proc/779/maps File opened for reading /proc/784/maps File opened for reading /proc/790/maps File opened for reading /proc/684/maps File opened for reading /proc/571/maps File opened for reading /proc/792/maps -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc File opened for modification /tmp//dev/FTWDT101_watchdog