Analysis
-
max time kernel
150s -
max time network
138s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
30-12-2024 16:48
Behavioral task
behavioral1
Sample
646-1-0x00008000-0x0002a768-memory.dmp
Resource
debian12-armhf-20240221-en
debian-12-armhf
3 signatures
150 seconds
General
-
Target
646-1-0x00008000-0x0002a768-memory.dmp
-
Size
93KB
-
MD5
2e62f132c44901517eb0af09e8d17634
-
SHA1
b8f51f6c1552712e5c555ed69319bf5f4c590aa7
-
SHA256
99571a1a1d56ed926fa59b2ec7b3460e5ae2d515b8ac93ce5f9664fec12370d2
-
SHA512
2e528d5522ad2b96c7ea1d075b242b59caae6c61e491d9790168336a764efbcbb65c8222a70750b960283c356546903c5453af8666dcbeedbedc71b3d40e402b
-
SSDEEP
1536:66nDIHMx4eoSl5wxqHuVObswX9htnyFI/hahF50Oe5U34BellcriAbDVo8Y7wjFM:IsxXozxIu65zx/hahF50OePpbDVo8fj2
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 646-1-0x00008000-0x0002a768-memory.dmp File opened for modification /dev/misc/watchdog 646-1-0x00008000-0x0002a768-memory.dmp -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 646-1-0x00008000-0x0002a768-memory.dmp File opened for modification /bin/watchdog 646-1-0x00008000-0x0002a768-memory.dmp -
description ioc Process File opened for reading /proc/629/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/665/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/679/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/684/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/715/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/730/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/731/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/632/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/648/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/663/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/703/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/728/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/647/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/699/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/704/cmdline 646-1-0x00008000-0x0002a768-memory.dmp File opened for reading /proc/711/cmdline 646-1-0x00008000-0x0002a768-memory.dmp