Analysis
-
max time kernel
144s -
max time network
150s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24/03/2025, 11:26
Behavioral task
behavioral1
Sample
g4za.arm7.elf
Resource
debian9-armhf-20240418-en
General
-
Target
g4za.arm7.elf
-
Size
163KB
-
MD5
5b5b105a659c595a40ee2967b5ca706a
-
SHA1
46be3e7bd1a7d9863c52f21cdb7bc7810e0819ea
-
SHA256
b02aa7761baea80255a2b1ff688bd55d6af539d5acf39dd02d2607e9e13a3bd6
-
SHA512
db68b2f18a5d068d5a3cac150b862f74ff8e0391260c398e831eb4b2f4b35856dcaaa8ad4e2c01a7695e735116de7c63e30c3264a5ffbc6e54530f75aec72926
-
SSDEEP
3072:YsfvqoYF/VrhMZofKPaC+LKWK6nTUCo4MbPbFJJM/9YM:Ysf/YF/kSyPaC+LKWdnEPbPbFrM/9YM
Malware Config
Signatures
-
Contacts a large (125491) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog g4za.arm7.elf File opened for modification /dev/misc/watchdog g4za.arm7.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp g4za.arm7.elf -
Reads process memory 1 TTPs 27 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/601/maps g4za.arm7.elf File opened for reading /proc/644/maps g4za.arm7.elf File opened for reading /proc/648/maps g4za.arm7.elf File opened for reading /proc/651/maps g4za.arm7.elf File opened for reading /proc/652/maps g4za.arm7.elf File opened for reading /proc/759/maps g4za.arm7.elf File opened for reading /proc/772/maps g4za.arm7.elf File opened for reading /proc/639/maps g4za.arm7.elf File opened for reading /proc/650/maps g4za.arm7.elf File opened for reading /proc/657/maps g4za.arm7.elf File opened for reading /proc/756/maps g4za.arm7.elf File opened for reading /proc/766/maps g4za.arm7.elf File opened for reading /proc/770/maps g4za.arm7.elf File opened for reading /proc/776/maps g4za.arm7.elf File opened for reading /proc/778/maps g4za.arm7.elf File opened for reading /proc/646/maps g4za.arm7.elf File opened for reading /proc/782/maps g4za.arm7.elf File opened for reading /proc/784/maps g4za.arm7.elf File opened for reading /proc/581/maps g4za.arm7.elf File opened for reading /proc/595/maps g4za.arm7.elf File opened for reading /proc/602/maps g4za.arm7.elf File opened for reading /proc/645/maps g4za.arm7.elf File opened for reading /proc/764/maps g4za.arm7.elf File opened for reading /proc/768/maps g4za.arm7.elf File opened for reading /proc/774/maps g4za.arm7.elf File opened for reading /proc/780/maps g4za.arm7.elf File opened for reading /proc/599/maps g4za.arm7.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ecijpb1bk6b2tlcg 647 g4za.arm7.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp g4za.arm7.elf