Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
135s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
14/01/2025, 03:18
Behavioral task
behavioral1
Sample
e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf
Resource
debian12-armhf-20240221-en
General
-
Target
e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf
-
Size
44KB
-
MD5
d0d3f0c88467e00d566c8df506a581f4
-
SHA1
579f0b997a9f8f5927c0e604eafcfc62c13bc9d4
-
SHA256
e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e
-
SHA512
64ceebef3ecd8d119f1a447f7633dba0a64a8eb6c8ad1b4831e5fb718d37e1c72a5c8d6f5638503b5f241bf5e57e06dea29790a8bf27328e37d7a9590430b314
-
SSDEEP
768:yYVcaSwvMgP95V2jK/yg2myaZ1xp5wsFa9G9q3UELL851ZScEVeoE+GN4KYy:3VcaR9r+0ydzaZ1x/JFKrLQ1Z9dJYy
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for modification /dev/misc/watchdog e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for modification /bin/watchdog e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf -
description ioc Process File opened for reading /proc/665/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/707/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/708/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/781/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/791/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/485/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/637/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/809/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/717/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/783/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/729/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/779/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/self/exe e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/680/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/685/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/701/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/706/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/715/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/767/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/780/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/492/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/636/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf File opened for reading /proc/819/cmdline e7884efe04e7a7c59ea2ae85c6d67be88bbf140d10093b7598067142a4f5017e.elf