Malware Analysis Report

2025-03-15 03:10

Sample ID 240415-leabmadd5z
Target 1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp
SHA256 c0422788900a49070028d45a10e653a3aa39957616185bb6a159b2ba1a2027b2
Tags
botnet mirai
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c0422788900a49070028d45a10e653a3aa39957616185bb6a159b2ba1a2027b2

Threat Level: Known bad

The file 1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp was found to be: Known bad.

Malicious Activity Summary

botnet mirai

Mirai family

Changes its process name

Modifies Watchdog functionality

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-15 09:26

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-15 09:26

Reported

2024-04-15 09:28

Platform

ubuntu1804-amd64-20240226-en

Max time kernel

0s

Max time network

128s

Command Line

[/tmp/1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp]

Signatures

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself /var/Sofia /tmp/1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp N/A

Modifies Watchdog functionality

Description Indicator Process Target
File opened for modification /dev/watchdog /tmp/1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp N/A
File opened for modification /dev/misc/watchdog /tmp/1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp N/A

Processes

/tmp/1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp

[/tmp/1546-1-0x0000000008048000-0x000000000805c8f8-memory.dmp]

Network

Country Destination Domain Proto
GB 185.125.188.62:443 tcp
GB 185.125.188.62:443 tcp
US 151.101.1.91:443 tcp
US 1.1.1.1:53 ocp-ingress.fastly.gnome.org udp
US 151.101.1.91:443 ocp-ingress.fastly.gnome.org tcp
US 151.101.66.49:443 tcp
N/A 224.0.0.251:5353 udp
GB 89.187.167.9:443 tcp

Files

N/A