Analysis
-
max time kernel
134s -
max time network
148s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
07/03/2025, 14:37
Behavioral task
behavioral1
Sample
drea4.elf
Resource
debian9-armhf-20240611-en
6 signatures
150 seconds
General
-
Target
drea4.elf
-
Size
155KB
-
MD5
c1f2972eb772dcdfc5de05ba17fd89fe
-
SHA1
a67293add206b63c2794a489eb763fcc3f7b7528
-
SHA256
b7a8882a502098f8b51aa06b9c215be250307c4e355f6f7073819d2562f23741
-
SHA512
0bdd20297852d2dd7c6c3974eaf9539126ca40ad9068fe0ba1faf9c066f0f9968edf88e58dcfea4b485e3c5f5def62938f25525508d92aa59ae779778ba6c217
-
SSDEEP
3072:Yrar2mhqodwdRbfW4psvkBSmIW8OWfiXf1:Yr/dpfW4p0kBVIsW6XN
Score
9/10
Malware Config
Signatures
-
Contacts a large (5122) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 667 drea4.elf -
Modifies Watchdog functionality 1 TTPs 1 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog drea4.elf -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog: drea4.elf File opened for modification /bin/watchdog: drea4.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself httpd 666 drea4.elf