Analysis
-
max time kernel
150s -
max time network
175s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20221125-en -
resource tags
arch:mipselimage:debian9-mipsel-20221125-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
18-05-2023 14:01
General
-
Target
fb027e55875fdc137eb8b4ac1e50ad16.elf
-
Size
24KB
-
MD5
fb027e55875fdc137eb8b4ac1e50ad16
-
SHA1
9535e040f07b84f8d71fd2e3391cc553e9a7cfb9
-
SHA256
220b6d4da6702a1ea1bd2ef0594ba6258fd3a1917efd1c0cc41ac74a1e8a90f7
-
SHA512
95faa11236f7ef79e7c5822eab977ab8da3c9525cf751804b50f7daeaadb04b36fc3381938975f47b29873d46ef9c278fe74d26f44ba7208027084d1106d99e2
-
SSDEEP
768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBpkxZqSWvw:4QlS07FUXqIYSXQKqumqY
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/misc/watchdog File opened for modification /dev/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 9 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/401/cmdline File opened for reading /proc/402/cmdline File opened for reading /proc/411/cmdline File opened for reading /proc/415/cmdline File opened for reading /proc/432/cmdline File opened for reading /proc/403/cmdline File opened for reading /proc/404/cmdline File opened for reading /proc/423/cmdline File opened for reading /proc/431/cmdline