Analysis
-
max time kernel
149s -
max time network
148s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
02-02-2025 05:03
Behavioral task
behavioral1
Sample
da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf
Resource
debian12-armhf-20240729-en
5 signatures
150 seconds
General
-
Target
da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf
-
Size
45KB
-
MD5
f6ce271e39c00c15e61793cd37558e17
-
SHA1
def693b1aab10d5d259cb331bdd1ecaa30655395
-
SHA256
da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0
-
SHA512
33221d8ae78038933c13db14e37b773284fa1572ca516a119fdb9aba25c3b75580b877468863d3cf27d5c7fde07826a78995fc8ecf1d0e93c497074d6e728919
-
SSDEEP
768:r/TYCoIxdEIZUy9xs/Q7ha7Shi4Njd7HIP9q3UELbUXfi6nVMQHI4vcGpvy:rECFay9xs4NaGi4j0+LRQZy
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for modification /dev/watchdog da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /bin/watchdog da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for modification /sbin/watchdog da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf -
description ioc Process File opened for reading /proc/658/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/671/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/689/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/695/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/640/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/655/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/639/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/694/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/702/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/720/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/self/exe da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf File opened for reading /proc/624/cmdline da5366e5a698f050642a22b543d8751f54fe48c8966c5ccfbe23b1ded59f53c0.elf