Analysis
-
max time kernel
149s -
max time network
149s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
20-01-2025 05:02
Behavioral task
behavioral1
Sample
ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf
Resource
debian12-armhf-20240418-en
debian-12-armhf
5 signatures
150 seconds
General
-
Target
ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf
-
Size
52KB
-
MD5
b2c5f835d54c4829e8f062e3e0f4f8a6
-
SHA1
e3b0b074c60927ddee00eef66939dd93540bc158
-
SHA256
ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f
-
SHA512
ec27677784dd7ce10ba8efed5b3d1e2dbb795bb6c037e10d5273b42fc1a5432055e7f78f97570359de3733c7b091fee7cfe6a542f46b046bb68f7578e1aa494b
-
SSDEEP
1536:qjzYAnr5oMZomQkE3dGQ+LLmyBGkKRKoMYj:d0VZHE3dGQ+L6dlMYj
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for modification /dev/misc/watchdog ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for modification /bin/watchdog ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf -
description ioc Process File opened for reading /proc/643/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/644/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/677/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/699/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/700/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/707/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/708/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/self/exe ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/659/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/662/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/695/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf File opened for reading /proc/635/cmdline ef6879e75ae0fa91215a456ab9411576fb46d9e701c81c3dd03ae530b63d089f.elf