Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    26-03-2024 02:04

General

  • Target

    7a3a141da6cf5d5d60e9f9388799362b750c404518617406d03ad42722538e1d.elf

  • Size

    31KB

  • MD5

    47b6d35e402f464f362e32d728f9b0b1

  • SHA1

    4a2b566ccf3bacaacaecf9408594114da0141325

  • SHA256

    7a3a141da6cf5d5d60e9f9388799362b750c404518617406d03ad42722538e1d

  • SHA512

    906772b0f1bb418a63b3c46b2978302e6febbc3c45b5eed81392a1acf201358a4c564c354f67235053f11a0a898a41a3237079336b3fd2dfe49f8668e8c3f33c

  • SSDEEP

    384:/n6Ppdqf3I54hJulN7s1kNYTA/fKiFs4V9B6f8Oj0bCwFtNKpugmQ/zTRWGVCz0m:P4YuDs1kNJ/fKiFUf8OGCgG/bdWJ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (20713) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 38 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7a3a141da6cf5d5d60e9f9388799362b750c404518617406d03ad42722538e1d.elf
    /tmp/7a3a141da6cf5d5d60e9f9388799362b750c404518617406d03ad42722538e1d.elf
    1⤵
      PID:709

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Impair Defenses

    1
    T1562

    Discovery

    Network Service Discovery

    2
    T1046

    System Network Connections Discovery

    1
    T1049

    System Network Configuration Discovery

    1
    T1016

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/709-1-0x00400000-0x00456a28-memory.dmp