Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-11-2024 15:48

General

  • Target

    ub8ehJSePAfc9FYqZIT6.arm7.elf

  • Size

    60KB

  • MD5

    2623e9f7b300d7ad9454f990e433d1ac

  • SHA1

    591c728a74a602994be882d92abbee70f7f690d7

  • SHA256

    1680a290d0867bf4981f5e8e12dd4124a420e5c518a321ddbdb88e1870a459f5

  • SHA512

    e9714610229b485ec36c52f447530e2640b998c126bec7eade3058d40e532f52b21e7f2feafe7dcdb85f9784282cbb30b64f332a5985c67be6afd766e5df2c00

  • SSDEEP

    1536:17XduYshWhq/HIEy6Og3Nwz9hAyb6LSM5Tfv83KJGTb6R4G:xdpssMPR9w4ymLXTX83K0Tb6Rh

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ub8ehJSePAfc9FYqZIT6.arm7.elf
    /tmp/ub8ehJSePAfc9FYqZIT6.arm7.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:633

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/633-1-0x00008000-0x000236c8-memory.dmp