Analysis
-
max time kernel
148s -
max time network
151s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
13/12/2024, 09:35
Behavioral task
behavioral1
Sample
0x86d.arm7.elf
Resource
debian12-armhf-20240418-en
4 signatures
150 seconds
General
-
Target
0x86d.arm7.elf
-
Size
152KB
-
MD5
e9fca3f9dc17c28e1bbf55fa1445370f
-
SHA1
f6afda93185302196ee1df3fa22f88c137833c2c
-
SHA256
c54067bb5857e2074e6ac93cac0127dc77694e710909178d02a189d321e8269f
-
SHA512
aba1ec854039107af1180f02d5d76364aaf89b48d6a79ac69ae4a46d5e7b2a985266bf1a1914dfeccfaf44f634ddd0a9b8bf56dbe1f265afd678611c01741789
-
SSDEEP
3072:xhXdgWEfdWD/AdLXDaD2LhDnbQl52zUcrq8Sh7uM/9BWBA:HXdg78D/6bDaD2LhDncldN8ShaM/90y
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 705 0x86d.arm7.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 0x86d.arm7.elf File opened for modification /dev/misc/watchdog 0x86d.arm7.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 0x86d.arm7.elf File opened for modification /bin/watchdog 0x86d.arm7.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself p4mi5ilsv1p2afnj 705 0x86d.arm7.elf