Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
07/03/2025, 02:50
Behavioral task
behavioral1
Sample
1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf
-
Size
90KB
-
MD5
70b9033366aed23047d2c0ab3015eb14
-
SHA1
789e11f3441f9a59ea05f7533028f068f4681e37
-
SHA256
1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682
-
SHA512
220c199bd209bc325039de75799b15254839da8c989c7346a9f112ee0e63d0006a9d9673edc336babd82702dbd7cf742090b26fd7051fe22d33dab72dc046008
-
SSDEEP
1536:fUNyqwipEXzKt4kKSdkVz+lW8RYExjSk7IB6FVEOnowRvJQEHx:8mkKSdG+lW8RYExjLM4VEOnowRvJrHx
Malware Config
Signatures
-
Contacts a large (23994) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for modification /dev/misc/watchdog 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf -
Reads process memory 1 TTPs 17 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/715/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/419/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/672/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/680/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/681/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/722/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/764/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/700/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/713/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/679/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/701/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/706/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/711/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/716/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/676/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/705/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/707/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 710 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp//dev/FTWDT101_watchdog 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf