Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
07/03/2025, 02:59
Behavioral task
behavioral1
Sample
1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf
Resource
debian9-mipsbe-20240729-en
General
-
Target
1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf
-
Size
90KB
-
MD5
70b9033366aed23047d2c0ab3015eb14
-
SHA1
789e11f3441f9a59ea05f7533028f068f4681e37
-
SHA256
1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682
-
SHA512
220c199bd209bc325039de75799b15254839da8c989c7346a9f112ee0e63d0006a9d9673edc336babd82702dbd7cf742090b26fd7051fe22d33dab72dc046008
-
SSDEEP
1536:fUNyqwipEXzKt4kKSdkVz+lW8RYExjSk7IB6FVEOnowRvJQEHx:8mkKSdG+lW8RYExjLM4VEOnowRvJrHx
Malware Config
Signatures
-
Contacts a large (23684) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for modification /dev/watchdog 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf -
Reads process memory 1 TTPs 17 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/661/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/664/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/694/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/709/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/719/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/792/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/421/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/667/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/784/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/714/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/715/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/721/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/666/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/716/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/722/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/730/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf File opened for reading /proc/780/maps 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 717 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp//dev/FTWDT101_watchdog 1718d85cb454ebac1c8deefec3f4c5242497042dd97985d153db64d9bd0b1682.elf