Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
05-12-2024 01:45
Behavioral task
behavioral1
Sample
25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f.elf
Resource
debian9-armhf-20240611-en
General
-
Target
25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f.elf
-
Size
68KB
-
MD5
bc6579db06dbba223f77dbe9d6942853
-
SHA1
b9088dd8560065eefa21c3a4ea64dcfacbadde70
-
SHA256
25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f
-
SHA512
5e106eaaf15a2a6bde5ae0b90a9bfa37743100a567ad7526db2db94629ae661b900df2efcd5769e50806be2b1afcaf932498c7812445f120603dba0887ae684e
-
SSDEEP
1536:XeQuwUIu1N6C15xqmX3CFxTykjJ77pyKBeON:XeQuwUF6M3CzWIF7pyKBe
Malware Config
Signatures
-
Contacts a large (143068) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f.elf File opened for modification /dev/misc/watchdog 25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f.elf File opened for modification /bin/watchdog 25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 649 25ec5bc3a50e86e3b8ad21c36f439087735987097560851fdeafe19b0eeb382f.elf