Analysis
-
max time kernel
105s -
max time network
161s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
30-12-2024 02:02
Behavioral task
behavioral1
Sample
0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf
Resource
debian12-armhf-20240221-en
General
-
Target
0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf
-
Size
58KB
-
MD5
50efda01ca3ecca5b47872216f029e40
-
SHA1
c1d94dfb10f5fb7c4b3331283ad3e1552c7959f3
-
SHA256
0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e
-
SHA512
fad99fc056412d7b58a2c616bf10210b976cc74bd4c123e29b7d478b1ea963eb06a74efbf1571c33ecbf932a3cb8c749995683a6b7b160d046b97e96f9cfcf46
-
SSDEEP
1536:62w1MM/IwPkVkqzE+efp/OuwFrJ5t792bLF9IM3/P95:62mnFP+WF0p5AcO3H
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
Contacts a large (190400) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for modification /dev/watchdog 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /bin/watchdog 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for modification /sbin/watchdog 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 703 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf -
description ioc Process File opened for reading /proc/625/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/657/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/660/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/700/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/708/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/710/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/self/exe 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/641/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/642/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/699/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/627/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/694/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/712/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/673/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf File opened for reading /proc/709/cmdline 0751f7565fc30f43e9c8a482aaacb7d8ebce13f8c932800338d923e1b579d89e.elf