Analysis
-
max time kernel
151s -
max time network
152s -
platform
debian-9_armhf -
resource
debian9-armhf-20231222-en -
resource tags
arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
12-01-2024 01:31
Behavioral task
behavioral1
Sample
551f533a0bcaaab15fe72e86de30d0a1
Resource
debian9-armhf-20231222-en
General
-
Target
551f533a0bcaaab15fe72e86de30d0a1
-
Size
75KB
-
MD5
551f533a0bcaaab15fe72e86de30d0a1
-
SHA1
3b445ef45f4f8238116859fe8d508837163a9646
-
SHA256
333f82ee9c681b229854641ec083da8ed17738f60796c52f67b989b6bf9644e9
-
SHA512
765b1df168181782fa328e5a8faccf95f2ba2a8d049a07ba66fe1630ff9946170d5080b141e0b207fc77fd9db7d495dcad57b4954f110bc1d30ac26441630ad2
-
SSDEEP
1536:4BVyHWPGswBBf0Jky5crVzXILjOf+UDcI0GTvgN:P2Tw9ZrBInU1tgN
Malware Config
Signatures
-
Contacts a large (93720) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself TAR77RGGmuTjpHub 666 551f533a0bcaaab15fe72e86de30d0a1 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/misc/watchdog File opened for modification /dev/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc File opened for reading /proc/net/tcp -
Writes file to system bin folder 1 TTPs 1 IoCs
description ioc File opened for modification /bin/watchdog -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/669/exe