Analysis

  • max time kernel
    149s
  • max time network
    8s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-11-2024 05:15

General

  • Target

    b47ebd689c7cbe560f3f0f1a7722c349df1ef307d24429dc9edf0ec86883d5c8.elf

  • Size

    26KB

  • MD5

    dcab5d9ca3b40643ebef3268185b6557

  • SHA1

    5c4e37769ffb73a5167fff724dc7e7676ecad222

  • SHA256

    b47ebd689c7cbe560f3f0f1a7722c349df1ef307d24429dc9edf0ec86883d5c8

  • SHA512

    0608153373eef9f1ae22920d9b35d46e6959f375b264502dc09d642569199bd2caa5adffdffd79d31bd84a5c76e54b8612bd2b3b4193e06d254aad7dab8d9e02

  • SSDEEP

    768:2JHRvHIJX6pWbolcCpWRk7vYsqZoQs3Uozhp:WHRvHkX6Y8cK8kVFzhp

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 48 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/b47ebd689c7cbe560f3f0f1a7722c349df1ef307d24429dc9edf0ec86883d5c8.elf
    /tmp/b47ebd689c7cbe560f3f0f1a7722c349df1ef307d24429dc9edf0ec86883d5c8.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:657

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/657-1-0x00008000-0x00022ac0-memory.dmp