Analysis
-
max time kernel
150s -
max time network
152s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
12-12-2024 14:26
Behavioral task
behavioral1
Sample
003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf
Resource
debian12-armhf-20240729-en
General
-
Target
003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf
-
Size
140KB
-
MD5
2a0b7f16db5aed804c69c300b55412bc
-
SHA1
ff96a4a08d3a4a08f6fbf31ecf1d2dc2bd8b4806
-
SHA256
003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf
-
SHA512
da0ae71358d3865ad1d4af6c1ce299f91e362cdc8aff466d8e2621b19fad0cef3d775baf3a62bc351a440b54de79cb3cc3463db68179943fa750a9b4cef38d9a
-
SSDEEP
3072:Pib6EdR0WkEZJYqNopEjuvMuK/U6YQXOaXWZ2M/94/r:WnRpkE73uvMuK//YfaX9M/94/r
Malware Config
Signatures
-
Contacts a large (24005) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for modification /dev/misc/watchdog 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf -
Reads process memory 1 TTPs 13 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/646/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/647/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/662/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/665/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/679/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/697/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/703/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/708/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/710/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/630/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/702/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/711/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf File opened for reading /proc/725/maps 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 704 003b259b6f830d298aee6b380471564fa37d9e222c6552d383a4138217e36dbf