Analysis
-
max time kernel
148s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
13-11-2024 23:47
Behavioral task
behavioral1
Sample
botnet.arm5.elf
Resource
debian9-armhf-20240611-en
General
-
Target
botnet.arm5.elf
-
Size
33KB
-
MD5
11ff4ac7c5e5ccc9690ff7cde902243d
-
SHA1
ed8098b637b33a8cd959c42c209a2a2380f7eeac
-
SHA256
38be69c29b666dd50612c0a2223b65d2cb0566b779248df393b536ec4e22f429
-
SHA512
15a50ab079cd77887a97f016eb40adb5061d66171b07e9295fe115fadfba6edaf14e2712f66b4c5d8884a2dbbcb26cabac91c01a9d09eaa56d60f56506b1850c
-
SSDEEP
768:qVeJDGugClAp31el6Om8+C60RruXOrQl+QmHTw3zVdIg3Uc:ZDG53QYOKCRRruXO8l+rHs3z8G
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (23830) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
chmodshpid process 666 chmod 657 sh -
Changes its process name 1 IoCs
Processes:
botnet.arm5.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/systemd 656 botnet.arm5.elf -
Processes:
mkdirmvbotnet.arm5.elfdescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/exe botnet.arm5.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/botnet.arm5.elf/tmp/botnet.arm5.elf1⤵
- Changes its process name
- Reads runtime system information
PID:656 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/botnet.arm5.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:657 -
/bin/rmrm -rf bin/systemd3⤵PID:658
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:660
-
-
/bin/mvmv /tmp/botnet.arm5.elf bin/systemd3⤵
- Reads runtime system information
PID:662
-
-
/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:666
-
-