Analysis
-
max time kernel
151s -
max time network
152s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
26-04-2023 09:13
General
-
Target
27164791e2edcd3914c6d46c73891084.elf
-
Size
45KB
-
MD5
27164791e2edcd3914c6d46c73891084
-
SHA1
f9552b7cf1c905668ab35242310986ce67a82c3b
-
SHA256
90728bd611fabdf5cc248fd60647dce89d910c0674cc7062aa4a752b8b51b0fb
-
SHA512
59d5635103065e750a17ee7f3568982162207b2853c6c2ad760b1fddce98fe0257b8dbc25c00ed28ae4d896e874800ce1f2d9194a66912b2b99988678d33b1e9
-
SSDEEP
768:D/TYCoIxdEk+AxoTZAZHFeq8b3rmq9q3UELbUXfi6nVMQHI4vcGpvb:DECFd+A6YHAxyfLRQZb
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies the Watchdog daemon 1 TTPs
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe 27164791e2edcd3914c6d46c73891084.elf