Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    ubuntu-20.04_amd64
  • resource
    ubuntu2004-amd64-20240221-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2004-amd64-20240221-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system
  • submitted
    07-05-2024 01:49

General

  • Target

    e76d37dc584871945719a86adc02d4f041aca86465872590cfb208cd57c46cb1.elf

  • Size

    32KB

  • MD5

    43e11544aaec72564d64c7116c5f78dd

  • SHA1

    e14dd28ceebb013e8e4c3b60699b6e294477aa1f

  • SHA256

    e76d37dc584871945719a86adc02d4f041aca86465872590cfb208cd57c46cb1

  • SHA512

    126a0ec228a3aa101b944a6a8b2e4dd9805396adea6a2d3e7f985c611899ecdb0430b0c6e86aa4c4eb75bd3f3d310217e5390ac58eac50d60182a3a397e05d1b

  • SSDEEP

    768:y0ccAAbmczyM7yAdRJkM/EUMXy5NjK7Xl5Th3/BNBahO:RBPDNLJkM/xnSrBNBEO

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/e76d37dc584871945719a86adc02d4f041aca86465872590cfb208cd57c46cb1.elf
    /tmp/e76d37dc584871945719a86adc02d4f041aca86465872590cfb208cd57c46cb1.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:1509

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1509-1-0x0000000008048000-0x0000000008059830-memory.dmp