Analysis
-
max time kernel
149s -
max time network
139s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
27-12-2024 01:52
Behavioral task
behavioral1
Sample
c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf
Resource
debian12-armhf-20240729-en
debian-12-armhf
5 signatures
150 seconds
General
-
Target
c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf
-
Size
45KB
-
MD5
ee14893e59b99c9999c59fc148dac737
-
SHA1
f47cc05ce490ee82244d2096144ec2926d3015d2
-
SHA256
c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3
-
SHA512
3b24f9e50ff333399ace15368725f9f6528d30793c2f23079a2dfc9f6f33e2532a1abb6091f5d59f8b8c2e62509c54bb1663c72f85137adb10b5d2fd22b76391
-
SSDEEP
768:g/TYCoIxdEk+AxoTZAZHFeq8b3t9q3UELbUXfi6nVMQHI4vcGpva:gECFd+A6YHAxALRQZa
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for modification /dev/misc/watchdog c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for modification /bin/watchdog c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf -
description ioc Process File opened for reading /proc/646/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/647/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/665/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/678/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/696/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/701/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/self/exe c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/630/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/709/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/722/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/662/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf File opened for reading /proc/702/cmdline c4fad1ec88bc396dc4ba7e1588d13d2aedb3150c4045a97462f3b44425f356e3.elf