Analysis
-
max time kernel
135s -
max time network
152s -
platform
debian-9_armhf -
resource
debian9-armhf-20240729-en -
resource tags
arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
06-01-2025 23:27
Behavioral task
behavioral1
Sample
arm4.elf
Resource
debian9-armhf-20240729-en
debian-9-armhf
4 signatures
150 seconds
General
-
Target
arm4.elf
-
Size
51KB
-
MD5
7a3d9a80bfc1d02843f53451aaba4756
-
SHA1
21f667c87ddfd22b53306a873608b6586dc8fe39
-
SHA256
ba2ce8b68bb705943865c6f17f48c5e43fec538f60da3520dda472eabd95501d
-
SHA512
6cc9c98d7bb73881438cf4f101ca0e265593e149499febc393060b2d6a23761e52e663eda49838abb2385dc6d4f1586992be67b04e4d1f0d0ae2ffc0c405a06e
-
SSDEEP
768:02SvB6x0u+o5a/QLLVP4t55YjyixOpMoi6oZkHPbzZHrz7h5/NPoBQw6vz8:rgBk0oLVs5WjyikpdoZkvvVX+Bg4
Score
9/10
Malware Config
Signatures
-
Contacts a large (112588) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog arm4.elf File opened for modification /dev/misc/watchdog arm4.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/Sofia 648 arm4.elf