Analysis
-
max time kernel
149s -
max time network
147s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
05/01/2025, 02:08
Behavioral task
behavioral1
Sample
2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf
Resource
debian12-armhf-20240221-en
5 signatures
150 seconds
General
-
Target
2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf
-
Size
45KB
-
MD5
bc01fb4b319cbeebf0de81aafc038d20
-
SHA1
7193ae7e285cb75b925feb709ca8c5701bffda1c
-
SHA256
2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655
-
SHA512
047ca84596a6c7aac380318b0fbd198bdc035097876c2fe3d94b233b90168aca2a1d07e83d173f8e020cf302928b3bd14748fd9fa3526461fe6db8bbca99a1bf
-
SSDEEP
768:D/TYCoIxdEk+AxoTZAZHFeq8b3Zp9q3UELbUXfi6nVMQHI4vcGpvx:DECFd+A6YHAxZcLRQZx
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for modification /dev/misc/watchdog 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for modification /bin/watchdog 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf -
description ioc Process File opened for reading /proc/646/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/665/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/679/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/683/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/705/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/734/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/735/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/632/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/647/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/662/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/714/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/727/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/self/exe 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/706/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/699/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/726/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf File opened for reading /proc/755/cmdline 2d7408b6f293dad0fe7d485d1434c91059f37ebd1cbc1d696ef2e79156d36655.elf