Malware Analysis Report

2025-03-15 03:12

Sample ID 241113-dgqsdswamn
Target dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf
SHA256 dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6
Tags
botnet mirai discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6

Threat Level: Known bad

The file dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf was found to be: Known bad.

Malicious Activity Summary

botnet mirai discovery

Mirai family

Deletes itself

Enumerates running processes

Changes its process name

Reads runtime system information

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-11-13 02:59

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-13 02:59

Reported

2024-11-13 03:02

Platform

debian9-armhf-20240611-en

Max time kernel

149s

Max time network

171s

Command Line

[/tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf]

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A

Enumerates running processes

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself httpd /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A

Reads runtime system information

discovery
Description Indicator Process Target
File opened for reading /proc/654/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/777/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/775/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/783/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/595/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/715/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/790/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/719/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/771/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/781/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/785/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/787/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/602/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/652/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/653/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/763/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/779/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/581/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/647/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/791/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/601/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/752/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/766/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/773/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/657/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/599/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/789/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/662/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A
File opened for reading /proc/764/exe /tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf N/A

Processes

/tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf

[/tmp/dca9c6bdadd1a24c517f4468ff97e8586add67fe8e6809d195ed9bd3ce7f62a6.elf]

Network

Country Destination Domain Proto
US 8.8.8.8:53 ksdjwi.eye-network.ru udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 154.216.16.109:33966 ksdjwi.eye-network.ru tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 154.216.16.109:33966 ksdjwi.eye-network.ru tcp

Files

N/A