Analysis
-
max time kernel
149s -
max time network
142s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
26-01-2025 04:09
Behavioral task
behavioral1
Sample
cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf
Resource
debian12-armhf-20240418-en
5 signatures
150 seconds
General
-
Target
cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf
-
Size
45KB
-
MD5
99e90ead98720d05415d5f26a5149396
-
SHA1
8839063c1ca002534c3ae02b352ae336dd1d9e63
-
SHA256
cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400
-
SHA512
79e7654f5cd04b438323ac05b72d8a745f4061c6060b3dadc8a4ac80c3a8cc41d178dba3ad7cee2f90989bea8c929bf8166d76c99b1a7f8905094e9a26f4d0d7
-
SSDEEP
768:S/TYCoIxdEk+AxoTZAZHFeq8b3B39q3UELbUXfi6nVMQHI4vcGpvh:SECFd+A6YHAxwLRQZh
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for modification /dev/misc/watchdog cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for modification /bin/watchdog cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf -
description ioc Process File opened for reading /proc/671/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/707/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/709/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/639/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/658/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/640/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/655/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/692/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/700/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/701/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/self/exe cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf File opened for reading /proc/623/cmdline cb4255c05917626e7855d9214d3d023cd02257893388fa3acb70c2392aeec400.elf