Analysis
-
max time kernel
52s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
27-12-2024 12:06
Behavioral task
behavioral1
Sample
656-1-0x00008000-0x0002d52c-memory.dmp
Resource
debian9-armhf-20240418-en
General
-
Target
656-1-0x00008000-0x0002d52c-memory.dmp
-
Size
104KB
-
MD5
c0ee6beb462104f74fa44ce867a8efa5
-
SHA1
1425a7d174f9774412d852d255a99387ee1390a2
-
SHA256
70a8bd95a80fc2c32964cc394bd04f3dfce28ef388b80f545a28fddbb73803f0
-
SHA512
652e28b656580ab84c03de1a410c3647d490f45308a1561d0c210da1d143d4639b6233adc68bd80f14c5799f30cb1ea11f253df19f06970e8bf2106aecc0d54e
-
SSDEEP
1536:LxnDNGnEkYBnmzzwrQJ0J5W5KC93BIrAXHhVHhpFRcJ9UckVZ9l3Di7ARru0oYzJ:anWnEzVWI/9QG/HhpFRcJ9UcI9Rr/T
Malware Config
Signatures
-
Contacts a large (196397) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 656-1-0x00008000-0x0002d52c-memory.dmp File opened for modification /dev/misc/watchdog 656-1-0x00008000-0x0002d52c-memory.dmp -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 656-1-0x00008000-0x0002d52c-memory.dmp File opened for modification /bin/watchdog 656-1-0x00008000-0x0002d52c-memory.dmp -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 652 656-1-0x00008000-0x0002d52c-memory.dmp -
description ioc Process File opened for reading /proc/651/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/657/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/774/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/601/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/644/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/649/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/650/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/656/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/661/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/731/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/733/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/753/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/772/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/606/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/607/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/655/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/688/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/719/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/723/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/765/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/586/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/604/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/658/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp File opened for reading /proc/767/cmdline 656-1-0x00008000-0x0002d52c-memory.dmp