Analysis
-
max time kernel
149s -
max time network
6s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
29-12-2024 02:14
Behavioral task
behavioral1
Sample
3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf
Resource
debian9-armhf-20240729-en
General
-
Target
3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf
-
Size
21KB
-
MD5
e7a22325e9ccbbad3c59f83ee4369244
-
SHA1
5c1ee586e6b3b2c18d736078ca54fbf9d732b61b
-
SHA256
3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012
-
SHA512
bc78c24e9fbeee9328857be5a82dd11249177263f2c177584ed06d0b0144847ec87818c07e5e6ac13b44a8bf98a8a43082797402b541f7e68ee03ad9459332e5
-
SSDEEP
384:vvtIoZxrSniaXs+qx+bwqPX+VOcFd5fHq52lxjHfDrIhymdGUop5hW:vvQn4j+ZO5fKAlxzDMs3Uoz4
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for modification /dev/misc/watchdog 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for modification /bin/watchdog 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf -
description ioc Process File opened for reading /proc/743/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/662/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/789/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/610/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/793/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/791/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/764/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/783/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/788/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/731/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/777/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/611/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/655/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/681/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/766/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/787/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/590/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/653/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/659/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/719/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/723/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/768/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/773/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/781/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/606/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/785/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/608/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/648/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/654/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/775/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/779/cmdline 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf File opened for reading /proc/self/exe 3a4dc407c6b8c0154b5448f24f564304b1abd6ec46083db3a922dd0847cc3012.elf