Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20230831-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20230831-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    29/09/2023, 17:58

General

  • Target

    41c3cfd382e14747950370fb07e96366.elf

  • Size

    24KB

  • MD5

    41c3cfd382e14747950370fb07e96366

  • SHA1

    80b7046cd0756fa2b671e9cd6e50d26dbdc7837f

  • SHA256

    59165a17931481d05d0f3536b272ceb2294e8c7b6168236b700b6a60d7f27798

  • SHA512

    79210348c7907efc81db996530b41fc80dfbd6e9df2d2f21655c5aa92b3cb172754e97a825cf6f4ff9fe50b157a86d281e575f56624138a0c07faeafa78726ae

  • SSDEEP

    768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBpqZqSWvi:4QlS07FUXqIYSXQKqueqa

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs

Processes

  • /tmp/41c3cfd382e14747950370fb07e96366.elf
    /tmp/41c3cfd382e14747950370fb07e96366.elf
    1⤵
      PID:326

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads