Analysis
-
max time kernel
151s -
max time network
158s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
13-04-2024 01:14
General
-
Target
6ecb71f04b99db3cb031f8db704a90ab2d1f0b8ec7e8097cfa1237098de92a4f.elf
-
Size
45KB
-
MD5
56a79906178be5282722ad3cffde9223
-
SHA1
ab97a292bf7cc9df2988ccb8db0342192db14845
-
SHA256
6ecb71f04b99db3cb031f8db704a90ab2d1f0b8ec7e8097cfa1237098de92a4f
-
SHA512
a806f760bb243cfc4602116357e42a3cbe26358787a96a6f06667d73db2e69d7ad9874c6917504cc39d906b3f8c8f22560e2adc1bb14de005d68ca9bc27df56d
-
SSDEEP
768:yG/g8BmXjsBzaI6UxXDNF5CJrXRSEDzOO/ARApD/D/P+gWaplha5T:v/g2mzdI6UxTz5cgEfr/AapD7/PV/sV
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (20076) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/misc/watchdog File opened for modification /dev/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 46 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/403/exe File opened for reading /proc/693/exe File opened for reading /proc/713/exe File opened for reading /proc/737/exe File opened for reading /proc/713/fd File opened for reading /proc/737/fd File opened for reading /proc/729/exe File opened for reading /proc/693/fd File opened for reading /proc/729/fd File opened for reading /proc/411/exe File opened for reading /proc/691/exe File opened for reading /proc/329/fd File opened for reading /proc/334/fd File opened for reading /proc/690/fd File opened for reading /proc/410/exe File opened for reading /proc/717/exe File opened for reading /proc/773/exe File opened for reading /proc/1/fd File opened for reading /proc/711/fd File opened for reading /proc/406/exe File opened for reading /proc/419/fd File opened for reading /proc/720/fd File opened for reading /proc/710/exe File opened for reading /proc/392/fd File opened for reading /proc/410/fd File opened for reading /proc/411/fd File opened for reading /proc/403/fd File opened for reading /proc/599/fd File opened for reading /proc/731/fd File opened for reading /proc/600/exe File opened for reading /proc/775/exe File opened for reading /proc/180/fd File opened for reading /proc/600/fd File opened for reading /proc/710/fd File opened for reading /proc/691/fd File opened for reading /proc/732/fd File opened for reading /proc/734/fd File opened for reading /proc/599/exe File opened for reading /proc/690/exe File opened for reading /proc/203/fd File opened for reading /proc/390/fd File opened for reading /proc/406/fd File opened for reading /proc/777/exe File opened for reading /proc/716/exe File opened for reading /proc/718/exe File opened for reading /proc/754/exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/727-1-0x00400000-0x0042e918-memory.dmp