Analysis
-
max time kernel
152s -
max time network
134s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221111-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
30-04-2023 14:50
General
-
Target
6e10f7141fc5bfe4560cd452ec0f4b2a.elf
-
Size
21KB
-
MD5
6e10f7141fc5bfe4560cd452ec0f4b2a
-
SHA1
eb0da94d39537297ae786191bc405ac476676ed6
-
SHA256
f3c9566e9977741079d3cc6f71cc2921be928e17df305bbe0c2d4cea142743e2
-
SHA512
b8d3ac11bc864b3dafd108d42f6a8e93ea268d5554aa67266694937e9e3b85efeb7fcaf38f279a18ba1f8aa1da5f5e96bd180ca362ca3464c41019ec527e64e9
-
SSDEEP
384:MOcDqRfKUWFH39z+/49ETVQrGLruI8qB+eANnlBQpMr/4oVk+v1Rph:zMkKJFH39CBVQey7qsZoMTTlph
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies the Watchdog daemon 1 TTPs
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 12 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/604/cmdline File opened for reading /proc/605/cmdline File opened for reading /proc/611/cmdline File opened for reading /proc/612/cmdline File opened for reading /proc/428/cmdline File opened for reading /proc/431/cmdline File opened for reading /proc/586/cmdline File opened for reading /proc/603/cmdline File opened for reading /proc/425/cmdline File opened for reading /proc/450/cmdline File opened for reading /proc/451/cmdline File opened for reading /proc/606/cmdline