Analysis
-
max time kernel
151s -
max time network
134s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20221125-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20221125-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
01-06-2023 17:11
General
-
Target
de24f4774949e5cde42148fd0c936596.elf
-
Size
20KB
-
MD5
de24f4774949e5cde42148fd0c936596
-
SHA1
2e35a228ca373d4006aa1665ed18c8498167f991
-
SHA256
14449d6b39eb3440616ea6931ccfb388f01ed5d9800b1cc2061fee282db4898f
-
SHA512
104d2b279d39d36a643b40f20ab00791f8421901bffbc5cbdeaa7570b88eef3bd4ba93efd3d465e836123c47a7cbdf2faa1b530bd43ceb1ceb700746bb102265
-
SSDEEP
384:MgWLpj8s/qPui8uZxoIA57RWQjJiEVi+ZkXaQNAr8vcoBAvP+qNV+KLebRtrHSy/:O98o08kxofBE+ZkXaT47C2EpitrN/
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 12 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/418/cmdline File opened for reading /proc/562/cmdline File opened for reading /proc/594/cmdline File opened for reading /proc/595/cmdline File opened for reading /proc/610/cmdline File opened for reading /proc/537/cmdline File opened for reading /proc/586/cmdline File opened for reading /proc/587/cmdline File opened for reading /proc/588/cmdline File opened for reading /proc/589/cmdline File opened for reading /proc/602/cmdline File opened for reading /proc/604/cmdline