Analysis
-
max time kernel
1s -
max time network
149s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
11-12-2024 20:36
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian12-armhf-20240221-en
5 signatures
150 seconds
General
-
Target
arm7.elf
-
Size
50KB
-
MD5
d5af8f2bb8c7c3e39981ba0099fa1d1c
-
SHA1
f12212c88dddb3c0298987b917c55063f942df88
-
SHA256
fec20fde8f5cb8d571cee50a2bf8103c9e63c57b2bfd098693974389fd79c8d9
-
SHA512
42b3455e467f11b68f000f6f375bd9d7f42d77c16184a3a6a36bbf4751e72a01b692032ee6d03a8ed398484cacbdb6231478d42099004f3674de84873c2e817e
-
SSDEEP
768:9WIA55yDHv3hnZji8OiWssyP151K8BLXJfiWkxnUGG3qQX9q3UELuFFjj3ytEJwc:9y5IThnZie151KKRi3UGOBmLufP3Huc
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
BOTNET
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog arm7.elf File opened for modification /dev/misc/watchdog arm7.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 707 arm7.elf -
description ioc Process File opened for reading /proc/self/exe arm7.elf