Analysis
-
max time kernel
145s -
max time network
141s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
05-01-2025 07:47
Behavioral task
behavioral1
Sample
t.elf
Resource
debian12-armhf-20240418-en
debian-12-armhf
4 signatures
150 seconds
General
-
Target
t.elf
-
Size
172KB
-
MD5
5eac14dfbadebe0e62d714bee8a873d0
-
SHA1
51a2ef104a64a21edfbebe3f1294ed7bb3605b59
-
SHA256
bfa0d7d433c1e0a5a89554d466294fc66bf83acc1b5284f6d9378f1870d4d642
-
SHA512
79a0bf584ee548d34e775ee0e7f8e95b0167d275c430aa2f19bdcfcd88f32f6e6d4b90655911407b64b3c49906bf346ca8fb56b33b0b806f68d00de5afc86e5b
-
SSDEEP
3072:L7EM1YSFQaDaV7r/OqZru7lt/CUnPD3MMM/9DsfGSfmUIwHyA/WRZ:R1QaDaV7r/RZIt/5nPD3/M/9DsOSfmUE
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog t.elf File opened for modification /dev/misc/watchdog t.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route t.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 705 t.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route t.elf