Analysis
-
max time kernel
145s -
max time network
144s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
06-01-2025 03:19
Behavioral task
behavioral1
Sample
ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf
Resource
debian9-armhf-20240611-en
General
-
Target
ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf
-
Size
135KB
-
MD5
09748a86923870171d1821e84a4ae778
-
SHA1
b583e96c59f11380bf6286904cb925c279f16378
-
SHA256
ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c
-
SHA512
9b2cc8d791b76c901c290792161b104ea006587bb5b4d6d9595327c269c0c9bda02bbe0bd215fd1e916f029eea7a66a0c05b9fd157313b46f43e111eeee05fb6
-
SSDEEP
3072:sh+Radi7iaPw5388shgZl1pzqcZRQNeN0eaLmhxQu72m/RZ:qXaPw5Rl1pzqY0eaLmhxQu72m/RZ
Malware Config
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf File opened for modification /dev/misc/watchdog ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 669 ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route ea358ee792f3c08a4b8c34cf10d1c04c9003c13d21d195d348173aa78ec4c75c.elf