Analysis
-
max time kernel
149s -
max time network
133s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
16-01-2025 03:11
Behavioral task
behavioral1
Sample
97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf
Resource
debian12-armhf-20240221-en
debian-12-armhf
5 signatures
150 seconds
General
-
Target
97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf
-
Size
45KB
-
MD5
88a8b4e1a053f675ea7dd41fc2d684fb
-
SHA1
9b1067a9b353bc4eef7f3693dc304d5bdb5e97d9
-
SHA256
97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5
-
SHA512
eec4c59c918aa1a37df0d535cd1780d856564b379e71d26d37845e2a33894ceabf432c6d4165ec2ee412fd72bc9fe67f984242bfa662ed629c81e9dd257c1dc9
-
SSDEEP
768:D/TYCoIxdEk+AxoTZAZHFeq8b3IV9q3UELbUXfi6nVMQHI4vcGpvF:DECFd+A6YHAxIoLRQZF
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for modification /dev/misc/watchdog 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for modification /bin/watchdog 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf -
description ioc Process File opened for reading /proc/706/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/self/exe 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/614/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/619/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/683/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/701/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/714/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/458/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/461/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/665/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/707/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf File opened for reading /proc/713/cmdline 97f6c6ff8124892729dda38ccb275462799336d6350accff4ea0944bd4e9dce5.elf