Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
12-12-2024 14:25
Behavioral task
behavioral1
Sample
711-1-0x00008000-0x00028a94-memory.dmp
Resource
debian9-armhf-20240729-en
debian-9-armhf
2 signatures
150 seconds
General
-
Target
711-1-0x00008000-0x00028a94-memory.dmp
-
Size
86KB
-
MD5
b6733e346702d8d9dba83cca334300e7
-
SHA1
8f9786304e7e094e747ddb855df7554ea8a760bc
-
SHA256
69e1453cd0cff9eb16ba3307a179e5718dc7a51ca8210798de480f34ed71f241
-
SHA512
f266dd41f5cebf4ef683058a50d5f5574c13038ae572215dad06bd688682779b134d74e61cf7f490745cf9ea1d8f9b8957ea4c6b09e396e5c7214ca389baab9b
-
SSDEEP
1536:2unsdrMxu3MwTnZYTH+hSYWfYb7JIM5tXWAWj2M7YYcMNlidiVTPmQ9k6:8oxQMyZKewNs9IM5tXWAWj2M7YDSTPX6
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 711-1-0x00008000-0x00028a94-memory.dmp File opened for modification /dev/misc/watchdog 711-1-0x00008000-0x00028a94-memory.dmp -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 643 711-1-0x00008000-0x00028a94-memory.dmp