Analysis
-
max time kernel
149s -
max time network
158s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14-12-2024 11:55
Behavioral task
behavioral1
Sample
89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf
Resource
debian9-armhf-20240611-en
General
-
Target
89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf
-
Size
154KB
-
MD5
aa35350aff901b18f6ccd15c9ac26f47
-
SHA1
b02f4b093b3668257e7c45070a76ef78221764f0
-
SHA256
89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f
-
SHA512
7b397b1f65f51190b170cb378b83aaf4585226a29fba0cdba586e5500af3ba9ca7565b57dc62a15791e64d591e8c18d5aecfd35649131b2b0e8cbf2c3a3b4230
-
SSDEEP
3072:qTlM7izW3PBmbF4tdprGND5EHmVOqiX0wbZno:qTmV/wJ4tHrGNWHmgqiEwRo
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 653 sh 667 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf File opened for modification /dev/misc/watchdog 89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 652 89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps 89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf/tmp/89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:652 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:653 -
/bin/rmrm -rf bin/busybox3⤵PID:655
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:656
-
-
/bin/mvmv /tmp/89dd9cf4c505ab6c743dde3a18fcdd6024a2ae73312ce3c1a03d7b02047da98f.elf bin/busybox3⤵
- Reads runtime system information
PID:663
-
-
/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:667
-
-