Analysis
-
max time kernel
149s -
max time network
131s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
09/12/2024, 02:38
Behavioral task
behavioral1
Sample
9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf
Resource
debian12-armhf-20240418-en
5 signatures
150 seconds
General
-
Target
9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf
-
Size
45KB
-
MD5
692eabb69c031e42d5156c592a470944
-
SHA1
fe4e9eef1330bc840001405a1bc696125aaf1c3b
-
SHA256
9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef
-
SHA512
3d972f640475223f067069e85f954fcb277d8208b570f3eca712ef30d470210c843b3494a1ce0efdee618b3412105e0edca4c5a5479d9caebfc06bdd1b6cbce9
-
SSDEEP
768:Z7ZxCMtE5CUbgAqLDfYko9S5FDfrYnLFnWJ5R9q3UELo8q0ln5fhZX9uOah/:ZV4KE5C+ghLDgktFfwRnK5EL5Tn55ZAb
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for modification /dev/misc/watchdog 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for modification /bin/watchdog 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf -
description ioc Process File opened for reading /proc/630/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/647/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/663/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/664/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/681/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/698/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/704/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/712/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/715/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/self/exe 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/648/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf File opened for reading /proc/705/cmdline 9cc1801bf468bb5099f98d91cca28ba53d1b15ed410f9cd6708982ef3e12d6ef.elf