Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
18-10-2024 01:58
Behavioral task
behavioral1
Sample
7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf
Resource
debian9-mipsbe-20240729-en
General
-
Target
7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf
-
Size
35KB
-
MD5
fd5d7deebbb62aee931a1701a1042450
-
SHA1
4adc94ce9de13647815a16d6514b73e109c80785
-
SHA256
7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9
-
SHA512
cb7beeb8d88ad48ac447b69b215738cdf1d706cb88c4945d0a0837c07dfe41a74107f9c4d7fccc5c7e5719ee9a912452ba3c53c360252bd46978f5d27c1b6df4
-
SSDEEP
768:O+DoIF4MqYZARntl54BnHU5HX/G9a2Q5IBSkbJgGlzDpUYsy:ORIpU56YXuI2bBRVqY9
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Contacts a large (213948) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elfdescription ioc Process File opened for modification /dev/watchdog 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for modification /dev/misc/watchdog 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf -
Writes file to system bin folder 2 IoCs
Processes:
7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elfdescription ioc Process File opened for modification /sbin/watchdog 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for modification /bin/watchdog 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf -
Changes its process name 1 IoCs
Processes:
7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elfdescription ioc pid Process Changes the process name, possibly in an attempt to hide itself a 700 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf -
Processes:
7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elfdescription ioc Process File opened for reading /proc/691/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/697/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/706/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/709/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/743/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/755/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/self/exe 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/664/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/667/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/674/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/675/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/703/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/705/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/713/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/776/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/796/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/692/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/698/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/704/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/744/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/764/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/669/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/696/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/731/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/756/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf File opened for reading /proc/768/cmdline 7a36bd7a9d19b6d48807264712141dd0543ffebd9db923a76799ffd687f352c9.elf