Analysis
-
max time kernel
106s -
max time network
164s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
12-12-2024 14:49
Behavioral task
behavioral1
Sample
664-1-0x00008000-0x00023af4-memory.dmp
Resource
debian12-armhf-20240221-en
General
-
Target
664-1-0x00008000-0x00023af4-memory.dmp
-
Size
76KB
-
MD5
08b3b52105f20ea93d3910e408e223c2
-
SHA1
4693041e56cc439b3d4cd2aeaf5aead350216ee0
-
SHA256
fcd8a6fc9e1bab10ffd2934270702658d9b5e93eb04c67f8583b174013a5799f
-
SHA512
ed876be96f01b6ba9351d9a9e1d2a1d81aa594d038e2b4a1d3186baae7bf83d0e0580bde644d1b6d7b563f81a138a53509cf4ffb91425897aaf47f96b874c79e
-
SSDEEP
1536:RXnxKAS+zOpv3hVV+ztrIVc2WSON60MupaT9Wf6d/cn9SS1OI5w8vYULrkOhe5U7:9zOpzVRySdTgf6d/cn9h13L8DM
Malware Config
Signatures
-
Contacts a large (112325) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 664-1-0x00008000-0x00023af4-memory.dmp File opened for modification /dev/misc/watchdog 664-1-0x00008000-0x00023af4-memory.dmp -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 714 664-1-0x00008000-0x00023af4-memory.dmp -
description ioc Process File opened for reading /proc/ 664-1-0x00008000-0x00023af4-memory.dmp