Malware Analysis Report

2025-06-15 19:38

Sample ID 240521-rq2sxahb31
Target 864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf
SHA256 864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296
Tags
mirai
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296

Threat Level: Known bad

The file 864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf was found to be: Known bad.

Malicious Activity Summary

mirai

Mirai family

Deletes itself

Modifies Watchdog functionality

Traces itself

Writes file to system bin folder

Changes its process name

Reads runtime system information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-21 14:24

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 14:24

Reported

2024-05-21 14:27

Platform

ubuntu2004-amd64-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

[/tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf]

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A

Modifies Watchdog functionality

Description Indicator Process Target
File opened for modification /dev/watchdog /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A
File opened for modification /dev/misc/watchdog /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A

Traces itself

Description Indicator Process Target
N/A N/A /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A

Writes file to system bin folder

Description Indicator Process Target
File opened for modification /sbin/watchdog /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A
File opened for modification /bin/watchdog /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself /var/Sofia /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A

Reads runtime system information

Description Indicator Process Target
File opened for reading /proc/1331/fd /tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf N/A

Processes

/tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf

[/tmp/864dd2c515bc94a27f0905ba64c4ef1f79774e47eab6e609ad66952f72b71296.elf]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 gouglou.xyz udp
NL 94.156.68.228:199 gouglou.xyz tcp
NL 94.156.68.228:57899 gouglou.xyz tcp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp
US 1.1.1.1:53 connectivity-check.ubuntu.com udp

Files

N/A