Analysis
-
max time kernel
145s -
max time network
133s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
05-01-2025 07:52
Behavioral task
behavioral1
Sample
y.elf
Resource
debian9-armhf-20240729-en
debian-9-armhf
4 signatures
150 seconds
General
-
Target
y.elf
-
Size
114KB
-
MD5
1411e0bacb1ac56f9edf16957c546053
-
SHA1
7fc4f176fca6c238d5a8119efa6a1b85e543464f
-
SHA256
d44134f23992a676ebb950df914e852bf32036f9cc5189f856c72e87b6672b92
-
SHA512
f7f9ee3815728ea475785c481b2c330a25990b1b60ab8f4142c5923c020a66822fef2686e1c8b8fbd6a1c5e99e7d1ff61b14dc5591127be23a053fd2e6c4e0f2
-
SSDEEP
3072:+/cpZmWwuQlftAIz2mqFbnzQUjPDm7XL7Q+cDNfD3Re:K2QlG7mqFbzvj7m7XL7Q+cDNfD3Re
Score
7/10
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog y.elf File opened for modification /dev/misc/watchdog y.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route y.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 645 y.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route y.elf