Analysis
-
max time kernel
150s -
max time network
8s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
08/03/2024, 22:07
General
-
Target
d803af620ecf81903a7dc1b2dd9da0b9.elf
-
Size
24KB
-
MD5
d803af620ecf81903a7dc1b2dd9da0b9
-
SHA1
13787adf7327263ec1ac38834ed3c73003eeae73
-
SHA256
1719318a4bfc813aea13c088ec5e42dec788fbdc8568e18d02839dfd9035b0f5
-
SHA512
1c7e7d3abd179ace8ee4b2d54eeab241a3be7ed985053694ba35021c2e945be608b18caa55daaa78f56852ecca298b2f78e18124e97020b4f96f713650e550ac
-
SSDEEP
768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBp8cZqSWvb:4QlS07FUXqIYSXQKquDqz
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc File opened for modification /bin/watchdog File opened for modification /sbin/watchdog -
Reads runtime system information 14 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/406/cmdline File opened for reading /proc/668/cmdline File opened for reading /proc/680/cmdline File opened for reading /proc/696/cmdline File opened for reading /proc/407/cmdline File opened for reading /proc/434/cmdline File opened for reading /proc/681/cmdline File opened for reading /proc/711/cmdline File opened for reading /proc/698/cmdline File opened for reading /proc/716/cmdline File opened for reading /proc/717/cmdline File opened for reading /proc/718/cmdline File opened for reading /proc/728/cmdline File opened for reading /proc/735/cmdline