Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
11-11-2024 02:24
Behavioral task
behavioral1
Sample
414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf
Resource
debian9-armhf-20240611-en
General
-
Target
414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf
-
Size
33KB
-
MD5
435c5797f6ceec4ca426271ad2a4e151
-
SHA1
03cbf06731f8a49f668027a9499210953a6482c0
-
SHA256
414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12
-
SHA512
50562f3d8c211220966beefb8af9cff33dfa2d565dcbb24a7abab2fd3b085cd2805efa2468deb0d3795a1878cbcf1ab0c986bfaa7b22f472eaf5cad707ee51cb
-
SSDEEP
768:pVeJDGugClAp31el9ykTytcZqWfPJog+zfTf5SNS3UX:aDG53QjdScZqWHwf50
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (22872) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shchmodpid process 662 sh 675 chmod -
Changes its process name 1 IoCs
Processes:
414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/watchdog 660 414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf -
Processes:
414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elfmkdirmvdescription ioc process File opened for reading /proc/self/exe 414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/watchdog sh
Processes
-
/tmp/414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf/tmp/414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf1⤵
- Changes its process name
- Reads runtime system information
PID:660 -
/bin/shsh -c "rm -rf bin/watchdog && mkdir bin; >bin/watchdog && mv /tmp/414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf bin/watchdog; chmod 777 bin/watchdog"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:662 -
/bin/rmrm -rf bin/watchdog3⤵PID:663
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:665
-
-
/bin/mvmv /tmp/414cfab9421debf15fbb84186304c7f8c90e74e23ee7a6dcd4f48be2892f7d12.elf bin/watchdog3⤵
- Reads runtime system information
PID:671
-
-
/bin/chmodchmod 777 bin/watchdog3⤵
- File and Directory Permissions Modification
PID:675
-
-