Analysis
-
max time kernel
152s -
max time network
134s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221111-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221111-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
19-05-2023 19:16
General
-
Target
boatnet.x86.elf
-
Size
20KB
-
MD5
1b513fea29e61cfc0c855df16f92f152
-
SHA1
f56e5847f98b44b3706576e8270173bfadc5f404
-
SHA256
b6c075cf7afb6189764c59ed02dfa9b520127adcda048964c0985f451b84dc0a
-
SHA512
fb81084faf9dda3f8329ac855bb0bf8da6da31efef62ed634238aded7f4e1405f9c23fc0791347918fd5d4fd33e73dc70e67a823f465c49c6d52f2e567be8936
-
SSDEEP
384:M87Lpj8s/qPui8uZxoIA57RWQjJiEVi+ZksavICMZDA5YqqUTwNIZT1n6Epl9zpj:R98o08kxofBE+ZksatoA5wUT1n6Ep3lv
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/misc/watchdog File opened for modification /dev/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 14 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/604/cmdline File opened for reading /proc/428/cmdline File opened for reading /proc/586/cmdline File opened for reading /proc/694/cmdline File opened for reading /proc/425/cmdline File opened for reading /proc/606/cmdline File opened for reading /proc/603/cmdline File opened for reading /proc/605/cmdline File opened for reading /proc/690/cmdline File opened for reading /proc/450/cmdline File opened for reading /proc/451/cmdline File opened for reading /proc/612/cmdline File opened for reading /proc/431/cmdline File opened for reading /proc/611/cmdline