Analysis
-
max time kernel
149s -
max time network
144s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
31-12-2024 02:50
Behavioral task
behavioral1
Sample
bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf
Resource
debian12-armhf-20240729-en
debian-12-armhf
5 signatures
150 seconds
General
-
Target
bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf
-
Size
45KB
-
MD5
3dee7a742c3240832d92af16796cbf41
-
SHA1
be1443888c2bbfd454511ae89d7088a48f704fdc
-
SHA256
bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869
-
SHA512
d145d1f33d609880468730e3290725e259f3d62b87147de764ee621cababe4ab92045a01cb06d4518cc7e1c8af4e38016cda423dab5d3ac570c60af2d835cec1
-
SSDEEP
768:D/TYCoIxdEk+AxoTZAZHFeq8b35sLN9q3UELbUXfi6nVMQHI4vcGpvb:DECFd+A6YHAxqgLRQZb
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for modification /dev/misc/watchdog bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for modification /bin/watchdog bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf -
description ioc Process File opened for reading /proc/647/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/663/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/648/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/665/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/678/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/695/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/700/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/701/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/self/exe bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/631/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/708/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf File opened for reading /proc/713/cmdline bffc0b923efab28f6fa96aa9db459193da608dd26226124dfeecbe3957602869.elf