Analysis
-
max time kernel
149s -
max time network
148s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
18-01-2025 05:09
Behavioral task
behavioral1
Sample
dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf
Resource
debian12-armhf-20240418-en
debian-12-armhf
5 signatures
150 seconds
General
-
Target
dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf
-
Size
45KB
-
MD5
e8a41dc58e963dfecad4fc9c3ff13fa9
-
SHA1
b5afdbd857f25af31a29012d84a7d12e511c8a13
-
SHA256
dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c
-
SHA512
001e2a251f1c2c91c85ba11fb0cda25f24feada7e3ce1dce7373885a1111842428a34f0faafdb3d38e4cc1909a49e86c9190f53b44a01525948d90e29724c947
-
SSDEEP
768:452yn/yZu5Yx9xaQJnhSJ4YyR0tNTpg99q3UELz+aNfwN35kjQ9Go6zm7D8:45B/ux6QLLYBNhL6aNfwNmjQ9Go6zmP8
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for modification /dev/watchdog dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for modification /bin/watchdog dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf -
description ioc Process File opened for reading /proc/680/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/698/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/703/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/661/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/663/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/704/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/711/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/self/exe dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/628/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/645/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/646/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf File opened for reading /proc/721/cmdline dbafac37299d30b6cd3a58a64a93e575cf8541b7c5934b8a82b8361d36c5f48c.elf