Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29/10/2024, 14:55

General

  • Target

    zmap.arm.elf

  • Size

    74KB

  • MD5

    823958d1dbb59368ec9cb465345ede82

  • SHA1

    4246851d3b9f1b59c45e2069fc1e204fa2937fc6

  • SHA256

    ce3fcb923990e59f2bcee0f811a868fa7a0abf2a461b54974977d1db6e940aee

  • SHA512

    2598ed24790e8e29fe7e54c8b06c65bc58a55348a0eb20359d6b25eeee0d5565b5746915c6f07f6149f8c0fa8ffac3a060bb7b794d36dbfeaeb40f8aebe4803d

  • SSDEEP

    1536:+jdTb69MAWg92P72qa9H4S5wPX6WZeqLeBZebFvTsA:+jd14H4QWZetb0Ts

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Changes its process name 1 IoCs

Processes

  • /tmp/zmap.arm.elf
    /tmp/zmap.arm.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    PID:644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads