Analysis
-
max time kernel
130s -
max time network
147s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
02-11-2024 14:42
Behavioral task
behavioral1
Sample
zmap.arm7.elf
Resource
debian9-armhf-20240418-en
debian-9-armhf
4 signatures
150 seconds
General
-
Target
zmap.arm7.elf
-
Size
152KB
-
MD5
093e778346d9c10ca1c5bbe123883ed8
-
SHA1
ee38ec6c10dbe99c7c4565ea29e576126b24ed7e
-
SHA256
26f03b1a5b496174d86c268023ab89bfa0ab5fdc593f96366be0b56e0de1bb34
-
SHA512
e8e53d0a989afa9b901bf634c3c32ab6d525b06de30f03bdad2d3a201a1b87fc383a2cb6c2bba4edebfa5e2f39c36a6d7b55f9c50c12921125863bee47b0fe9e
-
SSDEEP
3072:gXNsG9xNku0haoanAE+zRzHnbNc57VMz8LSO4PFM/9h7TBA:gXNsiEuNoanL+zRzHbNyzLS7dM/9Zy
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
zmap.arm7.elfpid process 643 zmap.arm7.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
zmap.arm7.elfdescription ioc process File opened for modification /dev/watchdog zmap.arm7.elf File opened for modification /dev/misc/watchdog zmap.arm7.elf -
Writes file to system bin folder 2 IoCs
Processes:
zmap.arm7.elfdescription ioc process File opened for modification /sbin/watchdog zmap.arm7.elf File opened for modification /bin/watchdog zmap.arm7.elf -
Changes its process name 1 IoCs
Processes:
zmap.arm7.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself m67kjv3tba3m8gag 643 zmap.arm7.elf