Analysis
-
max time kernel
130s -
max time network
146s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
16-12-2024 13:47
Behavioral task
behavioral1
Sample
zmap.arm.elf
Resource
debian9-armhf-20240729-en
debian-9-armhf
4 signatures
150 seconds
General
-
Target
zmap.arm.elf
-
Size
74KB
-
MD5
9784e8db8dae548a6593644e3a168579
-
SHA1
afa7c4ce4b0122ec5f22dc37aa7658f41cb01008
-
SHA256
4278fcf8ef5692822cc5eccce4857b5132f8d029949b83925a7a1e6f5c969129
-
SHA512
7f48ae6e910f87f70995c6373083c534670e2f66310e51e8a0b43bc01a31327e33a992b3ad50bc4956e4c9fb3c0845e6ca6aca2dbb014e66487a8338efe2eb6c
-
SSDEEP
1536:8x9OyMsgQJ9CisizmaD7QWAqsugL6AjvvZ:8xKsmaAWAAKRvZ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 661 zmap.arm.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog zmap.arm.elf File opened for modification /dev/misc/watchdog zmap.arm.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog zmap.arm.elf File opened for modification /bin/watchdog zmap.arm.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself jcblgqn2ebsr6nwa 661 zmap.arm.elf