Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
160s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
07/03/2025, 03:29
Behavioral task
behavioral1
Sample
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf
Resource
debian9-armhf-20240611-en
General
-
Target
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf
-
Size
140KB
-
MD5
e1d0b97db4f5c8387f6bd263e9eceedd
-
SHA1
48b4781ae7fd5ed015ac4a30b78d7a5b96123994
-
SHA256
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870
-
SHA512
f3bef76e3d4a7fc61746dbdd617a828e1398848728794c7ee5129332114d0a6bac8ffe05d17f09b793fd1e1bef1bfc42a695daae6699a6d20de5e306915a8958
-
SSDEEP
3072:VYbSBlR85zjsTlYqNExIUXEOavkVQ/PcazWZSM/9vP/r:abuRuzjst7UXEOavoQMazZM/9vP/r
Malware Config
Signatures
-
Contacts a large (23989) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for modification /dev/misc/watchdog 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory 1 TTPs 30 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/587/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/605/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/659/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/776/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/663/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/767/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/782/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/784/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/653/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/780/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/788/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/652/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/660/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/690/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/731/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/765/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/772/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/786/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/778/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/790/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/603/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/792/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/647/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/723/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/774/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/607/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/608/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/654/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/657/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf File opened for reading /proc/719/maps 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 655 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp//dev/FTWDT101_watchdog 28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf