Analysis
-
max time kernel
152s -
max time network
8s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221111-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
14-05-2023 11:42
General
-
Target
boatnet.x86
-
Size
20KB
-
MD5
64b3adae26892d3aa2a2e529da518961
-
SHA1
ff8d1f21de1b5a52ef0a1e7266670703516e719e
-
SHA256
d04ede7693404fea91524a078e0cf066716da9140b96ce9d6db1e783e75a666d
-
SHA512
e4820f020e5c2fdbf386ff9ee2d6846cd3ffbc66a126fa6596dd520a204b1b61c775f7e4cc6a36f8a1e10f39c91c69677b01f8ef1e46bacf3d9007362aedadaa
-
SSDEEP
384:MgWLpj8s/qPui8uZxoIA57RWQjJiEVi+ZkXaqOKV14b+502F2vwA9dWuMW21bAKi:O98o08kxofBE+ZkXaqGbp2F2TWul0c5P
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies the Watchdog daemon 1 TTPs
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /bin/watchdog File opened for modification /sbin/watchdog -
Reads runtime system information 12 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/596/cmdline File opened for reading /proc/602/cmdline File opened for reading /proc/603/cmdline File opened for reading /proc/424/cmdline File opened for reading /proc/427/cmdline File opened for reading /proc/450/cmdline File opened for reading /proc/576/cmdline File opened for reading /proc/595/cmdline File opened for reading /proc/412/cmdline File opened for reading /proc/447/cmdline File opened for reading /proc/594/cmdline File opened for reading /proc/597/cmdline