Analysis
-
max time kernel
149s -
max time network
147s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20221111-en -
resource tags
arch:mipselimage:debian9-mipsel-20221111-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
01-06-2023 17:11
General
-
Target
e49303a29d5fc82cbb5dea4b0987ca91.elf
-
Size
24KB
-
MD5
e49303a29d5fc82cbb5dea4b0987ca91
-
SHA1
9105bb29710484dc41c52364cd749fc8ac3b9b04
-
SHA256
1ba4fd3ffa6f6f1944a6169e28cd80dee543046865a8ddd5efb39ac9ec8b51d3
-
SHA512
d36850eceb53bb2720f5fc7e43f882b914b5b1829530b1a7ad334fd471d77f0198d9a11a10674f311c36bd70da0e6bebc16552ad0dcd205c2064b3b16c818d57
-
SSDEEP
768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBp3nZqSWvX:4QlS07FUXqIYSXQKqu3ZqP
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 17 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/414/cmdline File opened for reading /proc/417/cmdline File opened for reading /proc/467/cmdline File opened for reading /proc/401/cmdline File opened for reading /proc/402/cmdline File opened for reading /proc/434/cmdline File opened for reading /proc/444/cmdline File opened for reading /proc/445/cmdline File opened for reading /proc/459/cmdline File opened for reading /proc/497/cmdline File opened for reading /proc/422/cmdline File opened for reading /proc/410/cmdline File opened for reading /proc/455/cmdline File opened for reading /proc/456/cmdline File opened for reading /proc/479/cmdline File opened for reading /proc/489/cmdline File opened for reading /proc/406/cmdline