Analysis
-
max time kernel
140s -
max time network
141s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11-11-2024 02:49
Behavioral task
behavioral1
Sample
a5f91ba6058f3a8a90b81345ab0833dc9157c7ed7bfc283de12cb0dbdf3c6358.elf
Resource
debian9-armhf-20240611-en
2 signatures
150 seconds
General
-
Target
a5f91ba6058f3a8a90b81345ab0833dc9157c7ed7bfc283de12cb0dbdf3c6358.elf
-
Size
174KB
-
MD5
1c9051c3a48064e1785f8ef8a601253a
-
SHA1
78ead191b88ff9ce55b964cf6d80cc3d6c385aa0
-
SHA256
a5f91ba6058f3a8a90b81345ab0833dc9157c7ed7bfc283de12cb0dbdf3c6358
-
SHA512
380bb5343012b2d7d2b648e00d9753a4fada85aadad2b3ad6dda1d06675a1bcb32eee99404a1994bf1665e1c78ac79264a1314663d0a278844afa4b02aa48f4b
-
SSDEEP
3072:wuadAFdMTaMirPVDoUSXd7f+5B+OwfkmexV7t5OGNmGwxM8QURH:w3AwTaMirP9ol1f+H+Ow8lxV7SGNmGwV
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog a5f91ba6058f3a8a90b81345ab0833dc9157c7ed7bfc283de12cb0dbdf3c6358.elf File opened for modification /dev/misc/watchdog a5f91ba6058f3a8a90b81345ab0833dc9157c7ed7bfc283de12cb0dbdf3c6358.elf -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 656 a5f91ba6058f3a8a90b81345ab0833dc9157c7ed7bfc283de12cb0dbdf3c6358.elf