Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
26-03-2024 13:12
General
-
Target
df4144d4e15eb528cbb3d62896cb3bb4
-
Size
29KB
-
MD5
df4144d4e15eb528cbb3d62896cb3bb4
-
SHA1
bc1b8bc0edcc4be0cf01d24dce9549316dc95fa6
-
SHA256
53e43078220f164963ca7aa648fb981e7f39e34c6b26d98eaf8148e8070d11c9
-
SHA512
2b658b113e52e6c148e55e8b50d3e2d423a04949797a31bfd9c68cffc0677b57efd3557beb87af570658a03e4de7edbdd4f8fa1e46b02342e3e894cdda60f021
-
SSDEEP
768:ad9c3tP8gJHcHMHygJT+lk30vmOhLX8o0jfXXs3Uozy:gEpdJMyIue/Mpj/Kzy
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (20428) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 58 IoCs
Reads data from /proc virtual filesystem.
Processes:
df4144d4e15eb528cbb3d62896cb3bb4description ioc File opened for reading /proc/312/fd File opened for reading /proc/670/exe File opened for reading /proc/781/exe File opened for reading /proc/590/fd File opened for reading /proc/591/fd File opened for reading /proc/804/exe File opened for reading /proc/575/exe File opened for reading /proc/798/exe File opened for reading /proc/800/exe File opened for reading /proc/269/fd File opened for reading /proc/664/fd File opened for reading /proc/661/exe File opened for reading /proc/575/fd File opened for reading /proc/616/fd File opened for reading /proc/792/exe File opened for reading /proc/143/fd File opened for reading /proc/267/fd File opened for reading /proc/311/fd File opened for reading /proc/667/fd File opened for reading /proc/self/exe df4144d4e15eb528cbb3d62896cb3bb4 File opened for reading /proc/265/fd File opened for reading /proc/266/fd File opened for reading /proc/670/fd File opened for reading /proc/801/exe File opened for reading /proc/170/fd File opened for reading /proc/213/fd File opened for reading /proc/270/fd File opened for reading /proc/657/fd File opened for reading /proc/765/exe File opened for reading /proc/786/exe File opened for reading /proc/788/exe File opened for reading /proc/794/exe File opened for reading /proc/802/exe File opened for reading /proc/666/fd File opened for reading /proc/676/exe File opened for reading /proc/684/exe File opened for reading /proc/656/exe File opened for reading /proc/561/fd File opened for reading /proc/656/fd File opened for reading /proc/673/fd File opened for reading /proc/806/exe File opened for reading /proc/667/exe File opened for reading /proc/616/exe File opened for reading /proc/796/exe File opened for reading /proc/659/exe File opened for reading /proc/785/exe File opened for reading /proc/316/fd File opened for reading /proc/669/fd File opened for reading /proc/591/exe File opened for reading /proc/658/fd File opened for reading /proc/737/exe File opened for reading /proc/790/exe File opened for reading /proc/1/fd File opened for reading /proc/733/exe File opened for reading /proc/662/exe File opened for reading /proc/323/fd File opened for reading /proc/561/exe File opened for reading /proc/590/exe