Analysis
-
max time kernel
151s -
max time network
15s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
25-02-2024 04:59
General
-
Target
4deb405c4dc93640de3bbaee41ec2dbea2630c0ba15ecde979455a998e304812.elf
-
Size
24KB
-
MD5
96f5dd071e6724e4604f637c3af6ce24
-
SHA1
928589b347fb15f61555795ff101398da7132b40
-
SHA256
4deb405c4dc93640de3bbaee41ec2dbea2630c0ba15ecde979455a998e304812
-
SHA512
a46a2168655a80e147d0c5a339610702d3c2e584f714ba547ed612c29d355dff9db4bb1c5c88f520e4d7e66da67db64b8750530dbb83f2548388ae224eee2a7d
-
SSDEEP
768:c4rQlS07dEv0UXqUhvQE+CXQKMQKCXBpEZq8WvT:BQlS07FUXqIYSXQKqu8qN
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 13 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/716/cmdline File opened for reading /proc/784/cmdline File opened for reading /proc/574/cmdline File opened for reading /proc/710/cmdline File opened for reading /proc/729/cmdline File opened for reading /proc/732/cmdline File opened for reading /proc/682/cmdline File opened for reading /proc/684/cmdline File opened for reading /proc/715/cmdline File opened for reading /proc/717/cmdline File opened for reading /proc/586/cmdline File opened for reading /proc/696/cmdline File opened for reading /proc/419/cmdline