Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    19-09-2024 01:05

General

  • Target

    14d3bdb539e16c43852d810e38f95dc59dd2a723a1c45734da7c2c0d040821b7.elf

  • Size

    45KB

  • MD5

    50f15f168839c7b6fd0a2e5fceeb13dd

  • SHA1

    049e61833c04a4a33cc6f59d20c8d2c253aaa430

  • SHA256

    14d3bdb539e16c43852d810e38f95dc59dd2a723a1c45734da7c2c0d040821b7

  • SHA512

    8a7fb19f3541c2e07147fd4e50c21523cf8651e32109bd3dce9c228c34c1d2c2044797ab335c13591da0ffc4c00f53579eed542823d74418cb27c3ea1609c970

  • SSDEEP

    768:D/TYCoIxdEk+AxoTZAZHFeq8b3I9q3UELbUXfi6nVMQHI4vcGpvB:DECFd+A6YHAxxLRQZB

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 14 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/14d3bdb539e16c43852d810e38f95dc59dd2a723a1c45734da7c2c0d040821b7.elf
    /tmp/14d3bdb539e16c43852d810e38f95dc59dd2a723a1c45734da7c2c0d040821b7.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:701

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/701-1-0x00008000-0x00026464-memory.dmp