Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
13-11-2024 23:47
Behavioral task
behavioral1
Sample
botnet.arm.elf
Resource
debian9-armhf-20240418-en
General
-
Target
botnet.arm.elf
-
Size
35KB
-
MD5
6a4e5e35ce65f48106f75266d91abb47
-
SHA1
6c7064721c97e4aa0fac8afab491b081381c28e6
-
SHA256
e1757c8fd0cfe73093e9ab4105f86e73f87faef58c35d5155a4bb34776a51170
-
SHA512
a761a4406313a59a5d81f07a52574fb4f234d83c29e7f39809c9c80c61adbc3361150b654e2a0a851198ecc152c03f871536f89d44e9963e745b5400fda77251
-
SSDEEP
768:PW2TCQ1qe4vcMRQSRC9kkrE1PfxVwtj6I5m1n7AeglWu0Jj3Uh:PW2epHUgU7E9Twh631no0Jc
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (23995) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shchmodpid process 640 sh 651 chmod -
Changes its process name 1 IoCs
Processes:
botnet.arm.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/busybox 638 botnet.arm.elf -
Processes:
mkdirmvbotnet.arm.elfdescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/exe botnet.arm.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/botnet.arm.elf/tmp/botnet.arm.elf1⤵
- Changes its process name
- Reads runtime system information
PID:638 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/botnet.arm.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:640 -
/bin/rmrm -rf bin/busybox3⤵PID:642
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:643
-
-
/bin/mvmv /tmp/botnet.arm.elf bin/busybox3⤵
- Reads runtime system information
PID:649
-
-
/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:651
-
-