Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
26/01/2025, 03:09
Behavioral task
behavioral1
Sample
17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf
Resource
debian12-armhf-20240729-en
5 signatures
150 seconds
General
-
Target
17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf
-
Size
45KB
-
MD5
0a7877fdc4500098ddac8e6081ba8fe1
-
SHA1
91540861b1c8be328fe3ab214dbc5bb83c8d2ecb
-
SHA256
17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4
-
SHA512
3b9875d3e4b7d24283b5436c2c91d49159fe7f0eec9bd538fa4106dbf915126299436d50b99bd37c3a236be4c57cd875e7e2560a46706b16a84ad95f7352ffe1
-
SSDEEP
768:5/TYCoIxdEk+AxoTZAZHFeq8b379q3UELbUXfi6nVMQHI4vcGpvB:5ECFd+A6YHAxaLRQZB
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for modification /dev/misc/watchdog 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for modification /bin/watchdog 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf -
description ioc Process File opened for reading /proc/695/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/701/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/714/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/647/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/678/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/648/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/663/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/664/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/702/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/708/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/self/exe 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf File opened for reading /proc/630/cmdline 17cd1a371051508c082dbbf1e23d04ebcc48f290e3b2c284c1db6bc45e1ba2d4.elf