Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-04-2023 09:13

General

  • Target

    27164791e2edcd3914c6d46c73891084.elf

  • Size

    45KB

  • MD5

    27164791e2edcd3914c6d46c73891084

  • SHA1

    f9552b7cf1c905668ab35242310986ce67a82c3b

  • SHA256

    90728bd611fabdf5cc248fd60647dce89d910c0674cc7062aa4a752b8b51b0fb

  • SHA512

    59d5635103065e750a17ee7f3568982162207b2853c6c2ad760b1fddce98fe0257b8dbc25c00ed28ae4d896e874800ce1f2d9194a66912b2b99988678d33b1e9

  • SSDEEP

    768:D/TYCoIxdEk+AxoTZAZHFeq8b3rmq9q3UELbUXfi6nVMQHI4vcGpvb:DECFd+A6YHAxyfLRQZb

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/27164791e2edcd3914c6d46c73891084.elf
    /tmp/27164791e2edcd3914c6d46c73891084.elf
    1⤵
    • Reads runtime system information
    PID:355

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/355-1-0x00008000-0x00026464-memory.dmp