Analysis
-
max time kernel
150s -
max time network
152s -
platform
linux_mipsel -
resource
debian9-mipsel-en-20211208 -
resource tags
arch:mipselimage:debian9-mipsel-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
08-05-2023 17:18
General
-
Target
ff801776924f351329285cceb1fccc49.elf
-
Size
29KB
-
MD5
ff801776924f351329285cceb1fccc49
-
SHA1
beb5c81f951abd667a157c5090c1514a890a793f
-
SHA256
0b47ff4950be491f52ab488974c5c2d129a3e26b76291620e13a90660c5789e8
-
SHA512
ff6b6d5c1cc3b99ed2be0143a5fedca26ec6629952286c73b8d26da9fb03264d375df73f6bc5ac7c75a7963e543c05d3b569f1afeff93263ba46808bc691a60d
-
SSDEEP
768:qpP5brCsdTo7R0dxdR3cTk3cpvmXcSKSzEbs9fvxWy:qpP1JW10dWk3ivmMSDBl
Malware Config
Extracted
Family
mirai
Botnet
BOTNET
Signatures
-
Contacts a large (111539) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon 1 TTPs
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Changes its process name 1 IoCs
Processes:
ff801776924f351329285cceb1fccc49.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /var/Sofia 329 ff801776924f351329285cceb1fccc49.elf -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/82/cmdline File opened for reading /proc/256/cmdline File opened for reading /proc/293/cmdline File opened for reading /proc/325/cmdline File opened for reading /proc/21/cmdline File opened for reading /proc/24/cmdline File opened for reading /proc/221/cmdline File opened for reading /proc/364/cmdline File opened for reading /proc/17/cmdline File opened for reading /proc/18/cmdline File opened for reading /proc/72/cmdline File opened for reading /proc/157/cmdline File opened for reading /proc/3/cmdline File opened for reading /proc/4/cmdline File opened for reading /proc/8/cmdline File opened for reading /proc/12/cmdline File opened for reading /proc/233/cmdline File opened for reading /proc/332/cmdline File opened for reading /proc/306/cmdline File opened for reading /proc/328/cmdline File opened for reading /proc/1/cmdline File opened for reading /proc/9/cmdline File opened for reading /proc/13/cmdline File opened for reading /proc/219/cmdline File opened for reading /proc/371/cmdline File opened for reading /proc/115/cmdline File opened for reading /proc/251/cmdline File opened for reading /proc/252/cmdline File opened for reading /proc/300/cmdline File opened for reading /proc/260/cmdline File opened for reading /proc/5/cmdline File opened for reading /proc/6/cmdline File opened for reading /proc/19/cmdline File opened for reading /proc/105/cmdline File opened for reading /proc/37/cmdline File opened for reading /proc/70/cmdline File opened for reading /proc/269/cmdline File opened for reading /proc/14/cmdline File opened for reading /proc/15/cmdline File opened for reading /proc/36/cmdline File opened for reading /proc/69/cmdline File opened for reading /proc/235/cmdline File opened for reading /proc/370/cmdline File opened for reading /proc/22/cmdline File opened for reading /proc/77/cmdline File opened for reading /proc/116/cmdline File opened for reading /proc/346/cmdline File opened for reading /proc/76/cmdline File opened for reading /proc/409/cmdline File opened for reading /proc/10/cmdline File opened for reading /proc/16/cmdline File opened for reading /proc/20/cmdline File opened for reading /proc/71/cmdline File opened for reading /proc/334/cmdline File opened for reading /proc/342/cmdline File opened for reading /proc/142/cmdline File opened for reading /proc/208/cmdline File opened for reading /proc/307/cmdline File opened for reading /proc/327/cmdline File opened for reading /proc/401/cmdline File opened for reading /proc/2/cmdline File opened for reading /proc/23/cmdline File opened for reading /proc/222/cmdline File opened for reading /proc/324/cmdline
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/329-1-0x00400000-0x00455b30-memory.dmp