Analysis
-
max time kernel
149s -
max time network
152s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14-04-2024 01:14
General
-
Target
44d9e0973784d8886de9d09aac8b02f7d29015041c5d934cc2d62b23ece578b2.elf
-
Size
35KB
-
MD5
7a6a8615e7bfb3d7c04fd0398853e60e
-
SHA1
b5929586b6b4a9cf4a093430d6d120fe32ef789e
-
SHA256
44d9e0973784d8886de9d09aac8b02f7d29015041c5d934cc2d62b23ece578b2
-
SHA512
50e64cc856db7a491bc9acac8fbb0c371410f90d3159fb2a310354f8b6be5576f358b427305eed3fd5d21f173eccbf46663ffbae05fe41eb3c2e60a5349d662c
-
SSDEEP
768:5hkY/FYUOHNEKRZahy7QHo3ua5BM9gKfSjK9q3UELe:5hkY9YUOHNHw0QIpMjf4Le
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (19995) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 62 IoCs
Reads data from /proc virtual filesystem.
Processes:
44d9e0973784d8886de9d09aac8b02f7d29015041c5d934cc2d62b23ece578b2.elfdescription ioc File opened for reading /proc/648/fd File opened for reading /proc/664/fd File opened for reading /proc/743/exe File opened for reading /proc/264/fd File opened for reading /proc/270/fd File opened for reading /proc/315/fd File opened for reading /proc/1/fd File opened for reading /proc/654/exe File opened for reading /proc/804/exe File opened for reading /proc/136/fd File opened for reading /proc/652/fd File opened for reading /proc/653/fd File opened for reading /proc/805/exe File opened for reading /proc/647/fd File opened for reading /proc/659/fd File opened for reading /proc/657/exe File opened for reading /proc/712/exe File opened for reading /proc/268/fd File opened for reading /proc/647/exe File opened for reading /proc/798/exe File opened for reading /proc/164/fd File opened for reading /proc/665/fd File opened for reading /proc/441/exe File opened for reading /proc/793/exe File opened for reading /proc/265/fd File opened for reading /proc/404/fd File opened for reading /proc/799/exe File opened for reading /proc/662/exe File opened for reading /proc/795/exe File opened for reading /proc/440/fd File opened for reading /proc/669/fd File opened for reading /proc/404/exe File opened for reading /proc/441/fd File opened for reading /proc/662/fd File opened for reading /proc/652/exe File opened for reading /proc/791/exe File opened for reading /proc/self/exe 44d9e0973784d8886de9d09aac8b02f7d29015041c5d934cc2d62b23ece578b2.elf File opened for reading /proc/297/fd File opened for reading /proc/610/fd File opened for reading /proc/648/exe File opened for reading /proc/656/exe File opened for reading /proc/673/exe File opened for reading /proc/789/exe File opened for reading /proc/308/fd File opened for reading /proc/781/exe File opened for reading /proc/784/exe File opened for reading /proc/788/exe File opened for reading /proc/269/fd File opened for reading /proc/610/exe File opened for reading /proc/779/exe File opened for reading /proc/298/fd File opened for reading /proc/389/fd File opened for reading /proc/661/fd File opened for reading /proc/440/exe File opened for reading /proc/665/exe File opened for reading /proc/774/exe File opened for reading /proc/783/exe File opened for reading /proc/797/exe File opened for reading /proc/204/fd File opened for reading /proc/678/exe File opened for reading /proc/785/exe File opened for reading /proc/787/exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/658-1-0x00008000-0x00025a04-memory.dmp