Analysis
-
max time kernel
130s -
max time network
149s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
04-12-2024 18:49
Behavioral task
behavioral1
Sample
zmap.arm7.elf
Resource
debian12-armhf-20240418-en
4 signatures
150 seconds
General
-
Target
zmap.arm7.elf
-
Size
152KB
-
MD5
b540c527ef1e9d9257dbaa7c53f69e66
-
SHA1
90c28faa4da485ac92892a46d9c386b22ce73a50
-
SHA256
4159c3de595635517869a18cd567c5025af81daf0b49f545a95c31361b0141c0
-
SHA512
f2afd6e7c36b44b75d62659142532b11092ddd600741f4bbe440ee853a18a4937e589d4a957dfa8b6c8cce3d4692962afcf37cc8fdc7573d572bfab6e52112c9
-
SSDEEP
3072:/3ds2yxRQmrWgNd3TaTOjRznbKd6+LkMDE0SK4PRM/92BA:/3dsdUmPvjaTOjRznmd4f0S/JM/92y
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 701 zmap.arm7.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog zmap.arm7.elf File opened for modification /dev/misc/watchdog zmap.arm7.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog zmap.arm7.elf File opened for modification /bin/watchdog zmap.arm7.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself w5cg0tqp0s48pj6r 701 zmap.arm7.elf