Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
154s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
07/03/2025, 01:07
Behavioral task
behavioral1
Sample
d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf
Resource
debian9-armhf-20240611-en
General
-
Target
d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf
-
Size
37KB
-
MD5
22a52ad7ce8f1cfbf7a832dc9970efe4
-
SHA1
70377ad7d5cf4ebbf6f8f4b0bde269e062290bef
-
SHA256
d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2
-
SHA512
d63c30a68e49f9687ddd6713a758cfdc72588fce3507345f00bb91f019e67b26f1039fb55ea502044207edcf9a92229a9af514acde31857682390a65d1aa8e6a
-
SSDEEP
768:H+3txiLhPVopS/R0I8p+NSJMXuESWi4kerWKCzOqWVX1oR5Y3Up:H+3riP2SyIfNUxES9eBkOxoR5L
Malware Config
Extracted
mirai
MIRAI
hjfdjkahfkejw.chickenkiller.com
Signatures
-
Mirai family
-
Contacts a large (175974) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 674 chmod 663 sh -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 662 d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf -
description ioc Process File opened for reading /proc/filesystems mv File opened for reading /proc/self/exe d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf/tmp/d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf1⤵
- Changes its process name
- Reads runtime system information
PID:662 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:663 -
/bin/rmrm -rf bin/systemd3⤵PID:665
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:667
-
-
/bin/mvmv /tmp/d641aff3b80837fdf9e15510241e3baec65ea2f8d544143ac8c73dd96b007fa2.elf bin/systemd3⤵
- Reads runtime system information
PID:669
-
-
/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:674
-
-