Analysis

  • max time kernel
    151s
  • max time network
    133s
  • platform
    debian-12_mipsel
  • resource
    debian12-mipsel-20240221-en
  • resource tags

    arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem
  • submitted
    18-10-2024 05:25

General

  • Target

    la.bot.mipsel.elf

  • Size

    79KB

  • MD5

    13b049ec9eb7519cec85124daca47dbf

  • SHA1

    6157249e6703edffeb5e0f41f496f5a3a131a15c

  • SHA256

    520c6faa57e3820aeba3326e7af423e782fc7adf91f2c361328f4d50a5f2edd0

  • SHA512

    76a9b4558c0a94727acb4e5f1175e6adb87de8505441be5e30ef862484bf09e4202808b0c4a745ea6f6cbd2a1b27966699c98ef6357eb01628fd4ef98f205a11

  • SSDEEP

    1536:Nqjp+RuQ/4xMaaBg1uBRfFmz4oL2rjKZb+o5a:NKE/4xMaau1uBVLjKO

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Renames itself 1 IoCs
  • Reads process memory 1 TTPs 1 IoCs

    Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

  • Changes its process name 1 IoCs
  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/la.bot.mipsel.elf
    /tmp/la.bot.mipsel.elf
    1⤵
    • Modifies Watchdog functionality
    • Renames itself
    • Reads process memory
    • Changes its process name
    • System Network Configuration Discovery
    PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads