Analysis

  • max time kernel
    106s
  • max time network
    164s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    12-12-2024 14:49

General

  • Target

    664-1-0x00008000-0x00023af4-memory.dmp

  • Size

    76KB

  • MD5

    08b3b52105f20ea93d3910e408e223c2

  • SHA1

    4693041e56cc439b3d4cd2aeaf5aead350216ee0

  • SHA256

    fcd8a6fc9e1bab10ffd2934270702658d9b5e93eb04c67f8583b174013a5799f

  • SHA512

    ed876be96f01b6ba9351d9a9e1d2a1d81aa594d038e2b4a1d3186baae7bf83d0e0580bde644d1b6d7b563f81a138a53509cf4ffb91425897aaf47f96b874c79e

  • SSDEEP

    1536:RXnxKAS+zOpv3hVV+ztrIVc2WSON60MupaT9Wf6d/cn9SS1OI5w8vYULrkOhe5U7:9zOpzVRySdTgf6d/cn9h13L8DM

Malware Config

Signatures

  • Contacts a large (112325) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Changes its process name 1 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/664-1-0x00008000-0x00023af4-memory.dmp
    /tmp/664-1-0x00008000-0x00023af4-memory.dmp
    1⤵
    • Modifies Watchdog functionality
    • Changes its process name
    • Reads runtime system information
    PID:714

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads