Analysis
-
max time kernel
149s -
max time network
141s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
16-01-2025 02:50
Behavioral task
behavioral1
Sample
655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf
Resource
debian12-armhf-20240729-en
General
-
Target
655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf
-
Size
22KB
-
MD5
76e0e8df12ca4d1804dfc1640a5ff664
-
SHA1
59c1f1704f3efc009f60d7b46e50041f82540bb9
-
SHA256
655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31
-
SHA512
3ba900fb8d5b0f49357470cf791c35fe241dabb4b2b3613be33f623ac27dcd1dc2dfb5cddc56641fc253ea53a554fb0cba3eab8c52d294878ea693558ecc66ed
-
SSDEEP
384:F/BctKdlw4DUrpZoNcepO235FUeZ062Zy46wMTa/bictgJwIlh7qmdGUEpiao:F/Bldlw4DUvgtpO2LUeC62E4cW/bttMB
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for modification /dev/misc/watchdog 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf -
Traces itself 1 IoCs
Traces itself to prevent debugging attempts
pid Process 703 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for modification /bin/watchdog 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf -
description ioc Process File opened for reading /proc/630/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/648/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/663/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/664/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/696/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/701/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/702/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/709/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/self/exe 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/647/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/678/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/710/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf File opened for reading /proc/722/cmdline 655cd3483b35ffea03fb1f3277f3fcb38c8e684723f7e459077099130de6ff31.elf