Analysis
-
max time kernel
148s -
max time network
7s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
12-03-2024 04:12
General
-
Target
8121413abe6fc0e8d91b859398a59f17a6f97debdcc2d731b290d2df2d9ad8fe.elf
-
Size
45KB
-
MD5
d985d8cd26a55be270498f8ee82a9c0c
-
SHA1
b1f2a5611a93d352119b2581d7ab7d3342cf7809
-
SHA256
8121413abe6fc0e8d91b859398a59f17a6f97debdcc2d731b290d2df2d9ad8fe
-
SHA512
9ac40477b0edf9b35b94edb5f1a21cb069dcbebac6e6dfdb0d6191b469b133cef2dd50606758991a12b5b9cca39e3ccd768ff46733c3b9c07b4405ede998735e
-
SSDEEP
768:xOsB+zn1If1XbPbzcU22PgHiGKUrkLi2u4/LbWCCH9q3UELYIk9r/e/lQMqqzA+j:xOseO1j3cU/PgH97rkhu4/mCvLYIO/e3
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 45 IoCs
Reads data from /proc virtual filesystem.
Processes:
8121413abe6fc0e8d91b859398a59f17a6f97debdcc2d731b290d2df2d9ad8fe.elfdescription ioc File opened for reading /proc/652/cmdline File opened for reading /proc/702/cmdline File opened for reading /proc/721/cmdline File opened for reading /proc/763/cmdline File opened for reading /proc/770/cmdline File opened for reading /proc/778/cmdline File opened for reading /proc/783/cmdline File opened for reading /proc/485/cmdline File opened for reading /proc/653/cmdline File opened for reading /proc/657/cmdline File opened for reading /proc/664/cmdline File opened for reading /proc/708/cmdline File opened for reading /proc/714/cmdline File opened for reading /proc/729/cmdline File opened for reading /proc/780/cmdline File opened for reading /proc/547/cmdline File opened for reading /proc/690/cmdline File opened for reading /proc/749/cmdline File opened for reading /proc/774/cmdline File opened for reading /proc/776/cmdline File opened for reading /proc/782/cmdline File opened for reading /proc/743/cmdline File opened for reading /proc/789/cmdline File opened for reading /proc/548/cmdline File opened for reading /proc/648/cmdline File opened for reading /proc/684/cmdline File opened for reading /proc/750/cmdline File opened for reading /proc/751/cmdline File opened for reading /proc/768/cmdline File opened for reading /proc/659/cmdline File opened for reading /proc/677/cmdline File opened for reading /proc/703/cmdline File opened for reading /proc/709/cmdline File opened for reading /proc/717/cmdline File opened for reading /proc/772/cmdline File opened for reading /proc/self/exe 8121413abe6fc0e8d91b859398a59f17a6f97debdcc2d731b290d2df2d9ad8fe.elf File opened for reading /proc/495/cmdline File opened for reading /proc/608/cmdline File opened for reading /proc/650/cmdline File opened for reading /proc/786/cmdline File opened for reading /proc/788/cmdline File opened for reading /proc/647/cmdline File opened for reading /proc/724/cmdline File opened for reading /proc/784/cmdline File opened for reading /proc/790/cmdline