Analysis
-
max time kernel
149s -
max time network
134s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
01/12/2024, 22:27
Behavioral task
behavioral1
Sample
701-1-0x00008000-0x00026464-memory.dmp
Resource
debian12-armhf-20240221-en
3 signatures
150 seconds
General
-
Target
701-1-0x00008000-0x00026464-memory.dmp
-
Size
76KB
-
MD5
f864ad22ff80d2a39da18ba4aba74469
-
SHA1
7ae77b3678b078a6fe17dd8b0087bc8732c36c25
-
SHA256
70854e9550f88b301c7b665b4a312fd517c5a4f1495e052c97d2906c92c00a93
-
SHA512
cfe278a8c06ebd5c9c0363ecfd5a254c203e7a45c915e4814d8a8487eaa87c7f7ac97d7888fdfefa1f4e3d5810c97f7c9154ea66c4e0d57665e760783243064a
-
SSDEEP
1536:TJnF9sFw8gu6+wyKaw1KpIPrbvr/6Ra1styKtI8ll5BihwlTQP+8oJ:RowpuQyNSG2eRa1styK9flTQPHo
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 701-1-0x00008000-0x00026464-memory.dmp File opened for modification /dev/misc/watchdog 701-1-0x00008000-0x00026464-memory.dmp -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 701-1-0x00008000-0x00026464-memory.dmp File opened for modification /bin/watchdog 701-1-0x00008000-0x00026464-memory.dmp -
description ioc Process File opened for reading /proc/781/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/665/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/701/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/708/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/684/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/719/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/782/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/492/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/637/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/679/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/706/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/780/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/815/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/714/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/731/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/770/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/784/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/798/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/485/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/636/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/707/cmdline 701-1-0x00008000-0x00026464-memory.dmp File opened for reading /proc/820/cmdline 701-1-0x00008000-0x00026464-memory.dmp