Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
08/10/2024, 16:59
Behavioral task
behavioral1
Sample
nullnet_load.arm.elf
Resource
debian9-armhf-20240418-en
General
-
Target
nullnet_load.arm.elf
-
Size
81KB
-
MD5
3427eb0374873f1695dd9feb0e5db1ea
-
SHA1
0165c5435b93c90206095e3eb5c28a8cdff0303c
-
SHA256
7ed7cbf064b2d49295a28931f8a95258acad0596ef5dea61713e58abafee2a8e
-
SHA512
af210294609a23c28ed667c184cc2ed2e65c0302319f8f9da891a36143018ef94b02da1909e8e5631edab4832c2eec568665231db3483145c7c430f07471c1e4
-
SSDEEP
1536:nPD2dG+bsLPfn2hpej3lzVM9D52c0wIXhkB8t46/foOy3JWpY:PD2dTXeTQJIRE84wfo53JW
Malware Config
Signatures
-
Contacts a large (70369) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog nullnet_load.arm.elf File opened for modification /dev/misc/watchdog nullnet_load.arm.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 32 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/713/maps nullnet_load.arm.elf File opened for reading /proc/772/maps nullnet_load.arm.elf File opened for reading /proc/776/maps nullnet_load.arm.elf File opened for reading /proc/597/maps nullnet_load.arm.elf File opened for reading /proc/658/maps nullnet_load.arm.elf File opened for reading /proc/749/maps nullnet_load.arm.elf File opened for reading /proc/635/maps nullnet_load.arm.elf File opened for reading /proc/642/maps nullnet_load.arm.elf File opened for reading /proc/762/maps nullnet_load.arm.elf File opened for reading /proc/768/maps nullnet_load.arm.elf File opened for reading /proc/778/maps nullnet_load.arm.elf File opened for reading /proc/782/maps nullnet_load.arm.elf File opened for reading /proc/590/maps nullnet_load.arm.elf File opened for reading /proc/648/maps nullnet_load.arm.elf File opened for reading /proc/755/maps nullnet_load.arm.elf File opened for reading /proc/770/maps nullnet_load.arm.elf File opened for reading /proc/641/maps nullnet_load.arm.elf File opened for reading /proc/678/maps nullnet_load.arm.elf File opened for reading /proc/598/maps nullnet_load.arm.elf File opened for reading /proc/640/maps nullnet_load.arm.elf File opened for reading /proc/649/maps nullnet_load.arm.elf File opened for reading /proc/773/maps nullnet_load.arm.elf File opened for reading /proc/577/maps nullnet_load.arm.elf File opened for reading /proc/595/maps nullnet_load.arm.elf File opened for reading /proc/645/maps nullnet_load.arm.elf File opened for reading /proc/764/maps nullnet_load.arm.elf File opened for reading /proc/647/maps nullnet_load.arm.elf File opened for reading /proc/774/maps nullnet_load.arm.elf File opened for reading /proc/766/maps nullnet_load.arm.elf File opened for reading /proc/780/maps nullnet_load.arm.elf File opened for reading /proc/709/maps nullnet_load.arm.elf File opened for reading /proc/757/maps nullnet_load.arm.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 643 nullnet_load.arm.elf