Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221125-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221125-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-05-2023 11:49

General

  • Target

    2f2703da1f6cf96dcee594b5192ed591.elf

  • Size

    45KB

  • MD5

    2f2703da1f6cf96dcee594b5192ed591

  • SHA1

    98379088ba73ec2d9780b3247e9767b0a4e3ca64

  • SHA256

    fea546be8d4769a5380a464f09b8e3c98b6faacf36c8e0b1096bbee3bebd5fb0

  • SHA512

    23e13de316f655104aa2d6eb138f14ae1b19fa6b5e6816105b6d22d0faf85ab4418e4b949f1fb37516c08a8be34979e6d06402e3a9f6830a72880cbef1803066

  • SSDEEP

    768:D/TYCoIxdEk+AxoTZAZHFeq8b3/n9q3UELbUXfi6nVMQHI4vcGpvI:DECFd+A6YHAxuLRQZI

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 27 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/2f2703da1f6cf96dcee594b5192ed591.elf
    /tmp/2f2703da1f6cf96dcee594b5192ed591.elf
    1⤵
    • Reads runtime system information
    PID:368

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-1-0x00008000-0x00026464-memory.dmp