Analysis
-
max time kernel
152s -
max time network
155s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
29-05-2023 20:13
General
-
Target
c1781b6440c32c3cd3b5af772eae3b6f.elf
-
Size
56KB
-
MD5
c1781b6440c32c3cd3b5af772eae3b6f
-
SHA1
f32bb16ada1982fd1b2957687b325c0e654f8749
-
SHA256
2afe3f14f806f1b435e2c7c0e82e7e709c8abc4db41b92dddac0fd5df7accb7f
-
SHA512
788ef2c2168cbd772db483855cf3a8aac796af14715f359dc8738bd14179a3bf9e09e15b8d8e625f2dd88a6d85b18209b274567db5c4054e4d9bd3704aad4c5e
-
SSDEEP
1536:mmRRqYI3gyfg/cTfAfVIYftVufrX51x7kDEc3Slge3:mmTLyI/cTfAfmdhc3Pe
Malware Config
Extracted
Family
mirai
Botnet
UNSTABLE
Signatures
-
Contacts a large (157694) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
c1781b6440c32c3cd3b5af772eae3b6f.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself a 351 c1781b6440c32c3cd3b5af772eae3b6f.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
c1781b6440c32c3cd3b5af772eae3b6f.elfdescription ioc process File opened for reading /proc/self/exe c1781b6440c32c3cd3b5af772eae3b6f.elf