Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
29/12/2024, 02:02
Behavioral task
behavioral1
Sample
db0fa4b8db0333367e9bda3ab68b8042.arm7.elf
Resource
debian9-armhf-20240611-en
General
-
Target
db0fa4b8db0333367e9bda3ab68b8042.arm7.elf
-
Size
58KB
-
MD5
50efda01ca3ecca5b47872216f029e40
-
SHA1
c1d94dfb10f5fb7c4b3331283ad3e1552c7959f3
-
SHA256
0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e
-
SHA512
fad99fc056412d7b58a2c616bf10210b976cc74bd4c123e29b7d478b1ea963eb06a74efbf1571c33ecbf932a3cb8c749995683a6b7b160d046b97e96f9cfcf46
-
SSDEEP
1536:62w1MM/IwPkVkqzE+efp/OuwFrJ5t792bLF9IM3/P95:62mnFP+WF0p5AcO3H
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
Contacts a large (198770) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for modification /dev/misc/watchdog db0fa4b8db0333367e9bda3ab68b8042.arm7.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for modification /bin/watchdog db0fa4b8db0333367e9bda3ab68b8042.arm7.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 661 db0fa4b8db0333367e9bda3ab68b8042.arm7.elf -
description ioc Process File opened for reading /proc/658/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/660/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/676/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/711/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/723/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/729/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/679/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/667/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/694/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/698/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/700/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/718/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/509/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/659/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/669/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/691/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/702/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/715/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/720/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/508/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/616/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/704/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/721/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/727/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/self/exe db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/465/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/668/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/701/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/710/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/719/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/653/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/664/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/454/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/652/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/666/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/686/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/706/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/708/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/724/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf File opened for reading /proc/725/cmdline db0fa4b8db0333367e9bda3ab68b8042.arm7.elf