Analysis
-
max time kernel
142s -
max time network
144s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11-11-2024 11:53
Behavioral task
behavioral1
Sample
7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860.elf
Resource
debian9-armhf-20240729-en
debian-9-armhf
2 signatures
150 seconds
General
-
Target
7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860.elf
-
Size
174KB
-
MD5
620eedf99fe71e537c9556bdf098b702
-
SHA1
3360a57d6b34caefd5dc60003ed5e8102bb686e7
-
SHA256
7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860
-
SHA512
cc4b9b947763d43365d9bb74a3b0f22ec4e4e989ce14100e94d3f07d4b013c2f160b7d45dceca3d745e18118dbad8ba879cf3313c5fd00a2428bd34940397559
-
SSDEEP
3072:wuadAFdMTaMirPVDoUSXd7f+5B+OtIVkeV77t5OGNmGwxM8QURH:w3AwTaMirP9ol1f+H+OtYbV77SGNmGwV
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860.elfdescription ioc Process File opened for modification /dev/watchdog 7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860.elf File opened for modification /dev/misc/watchdog 7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860.elf -
Changes its process name 1 IoCs
Processes:
7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860.elfdescription pid Process Changes the process name, possibly in an attempt to hide itself 645 7b2a1bee320f2fe2110b170e01c02863ca89bbf137fda16b5efc238c815fa860.elf