Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    linux_mipsel
  • resource
    debian9-mipsel-en-20211208
  • resource tags

    arch:mipselimage:debian9-mipsel-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    08-05-2023 17:18

General

  • Target

    ff801776924f351329285cceb1fccc49.elf

  • Size

    29KB

  • MD5

    ff801776924f351329285cceb1fccc49

  • SHA1

    beb5c81f951abd667a157c5090c1514a890a793f

  • SHA256

    0b47ff4950be491f52ab488974c5c2d129a3e26b76291620e13a90660c5789e8

  • SHA512

    ff6b6d5c1cc3b99ed2be0143a5fedca26ec6629952286c73b8d26da9fb03264d375df73f6bc5ac7c75a7963e543c05d3b569f1afeff93263ba46808bc691a60d

  • SSDEEP

    768:qpP5brCsdTo7R0dxdR3cTk3cpvmXcSKSzEbs9fvxWy:qpP1JW10dWk3ivmMSDBl

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (111539) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Changes its process name 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ff801776924f351329285cceb1fccc49.elf
    /tmp/ff801776924f351329285cceb1fccc49.elf
    1⤵
    • Changes its process name
    PID:329

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/329-1-0x00400000-0x00455b30-memory.dmp