Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
154s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240418-en -
resource tags
arch:mipselimage:debian12-mipsel-20240418-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
06/01/2025, 02:15
Behavioral task
behavioral1
Sample
20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf
Resource
debian12-mipsel-20240418-en
General
-
Target
20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf
-
Size
33KB
-
MD5
0af8e9a039db17a95d08308e2a7aa389
-
SHA1
f9460ece1c3eacf30340d1cdcb59ad14c97857d2
-
SHA256
20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799
-
SHA512
32647e73ba5ad1d30e1a89862fe0a65d70b2ea880a9bda46ff3e2df6c4d9168d2bb8e7f24cdd170337047532b79fbfc1cf9b3b5e1d0ba693e78a33e936529c87
-
SSDEEP
768:A4hu8Ute74oKXH+xiTzAnuoTy0NEwWPc6XLjWMdx:AaUtRoKXexiTz9oTy0SwcJH
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
Contacts a large (150261) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for modification /dev/watchdog 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for modification /bin/watchdog 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 743 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf -
description ioc Process File opened for reading /proc/756/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/self/exe 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/698/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/733/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/734/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/449/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/720/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/667/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/679/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/680/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/717/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/747/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/748/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/443/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/444/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/749/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/697/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf File opened for reading /proc/710/cmdline 20e0fb1af9aa7d0d162087ad61db439f690706019daa13c7998742bff28c4799.elf