Analysis
-
max time kernel
149s -
max time network
158s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
25-10-2024 01:14
Behavioral task
behavioral1
Sample
1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf
Resource
debian12-armhf-20240221-en
General
-
Target
1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf
-
Size
61KB
-
MD5
78ef06d30c3417fd84817290557cf5ed
-
SHA1
f95dfa04047c69ecd9bff2594dd1cf4a35f01df5
-
SHA256
1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883
-
SHA512
fe8dbbe1aa4e27efce28a60591f8053e1e19741183e1d52c803ef8eb0bfde3f699d26fec20eed12a4ff0da7fe68f0a977389f226e17e50a604030061b0f55828
-
SSDEEP
1536:+z3fnL7XnbtT9wA8W+ZgllYtRp13D0SOj5fiA:A/vhTqk5llMyliA
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Contacts a large (23047) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 711 sh 727 chmod -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/watchdog 709 1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf -
description ioc Process File opened for reading /proc/self/exe 1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/watchdog sh
Processes
-
/tmp/1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf/tmp/1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf1⤵
- Changes its process name
- Reads runtime system information
PID:709 -
/bin/sh/bin/sh -c "rm -rf bin/watchdog && mkdir bin; >bin/watchdog && mv /tmp/1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf bin/watchdog; chmod 777 bin/watchdog"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:711 -
/usr/bin/rmrm -rf bin/watchdog3⤵PID:717
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:721
-
-
/usr/bin/mvmv /tmp/1bebac58f8cd6b1a373373e755102e5d1636d1f22f93854d3a2c8f4feeb48883.elf bin/watchdog3⤵
- Reads runtime system information
PID:724
-
-
/usr/bin/chmodchmod 777 bin/watchdog3⤵
- File and Directory Permissions Modification
PID:727
-
-