Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29-05-2023 20:13

General

  • Target

    c1781b6440c32c3cd3b5af772eae3b6f.elf

  • Size

    56KB

  • MD5

    c1781b6440c32c3cd3b5af772eae3b6f

  • SHA1

    f32bb16ada1982fd1b2957687b325c0e654f8749

  • SHA256

    2afe3f14f806f1b435e2c7c0e82e7e709c8abc4db41b92dddac0fd5df7accb7f

  • SHA512

    788ef2c2168cbd772db483855cf3a8aac796af14715f359dc8738bd14179a3bf9e09e15b8d8e625f2dd88a6d85b18209b274567db5c4054e4d9bd3704aad4c5e

  • SSDEEP

    1536:mmRRqYI3gyfg/cTfAfVIYftVufrX51x7kDEc3Slge3:mmTLyI/cTfAfmdhc3Pe

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (157694) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/c1781b6440c32c3cd3b5af772eae3b6f.elf
    /tmp/c1781b6440c32c3cd3b5af772eae3b6f.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    PID:351

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/351-1-0x00008000-0x0002c57c-memory.dmp