Analysis

  • max time kernel
    149s
  • max time network
    7s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240221-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240221-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    24-02-2024 14:03

General

  • Target

    96f5dd071e6724e4604f637c3af6ce24.elf

  • Size

    24KB

  • MD5

    96f5dd071e6724e4604f637c3af6ce24

  • SHA1

    928589b347fb15f61555795ff101398da7132b40

  • SHA256

    4deb405c4dc93640de3bbaee41ec2dbea2630c0ba15ecde979455a998e304812

  • SHA512

    a46a2168655a80e147d0c5a339610702d3c2e584f714ba547ed612c29d355dff9db4bb1c5c88f520e4d7e66da67db64b8750530dbb83f2548388ae224eee2a7d

  • SSDEEP

    768:c4rQlS07dEv0UXqUhvQE+CXQKMQKCXBpEZq8WvT:BQlS07FUXqIYSXQKqu8qN

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 22 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/96f5dd071e6724e4604f637c3af6ce24.elf
    /tmp/96f5dd071e6724e4604f637c3af6ce24.elf
    1⤵
      PID:709

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/709-1-0x00400000-0x00452a58-memory.dmp