Analysis

  • max time kernel
    135s
  • max time network
    174s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    13-11-2024 07:32

General

  • Target

    ub8ehJSePAfc9FYqZIT6.arm6.elf

  • Size

    43KB

  • MD5

    a2704328a12405ec890423b56a54ae95

  • SHA1

    fca3901ffc843c1e86af1939aee138f8e780fa6f

  • SHA256

    0f1805bc2402069b538a25fa633bc680090c5dcb8ac930b55b626ee45615d562

  • SHA512

    27524353afce1c8639d284f2ac83945799590401ca71502129a67c53fdf8227afc07015bc8ae3f64bbbe747a92392ddc81f8324942464c34c49a4822be8ac293

  • SSDEEP

    768:EnZOKj8x/QSQ3y/4qFTOdeoJWBhdYnjWcBWDW4s5GyZDa6XXfSwmH9q3UELn:yXwQSYPqFHI8rOjBn4+9DX6wmWLn

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ub8ehJSePAfc9FYqZIT6.arm6.elf
    /tmp/ub8ehJSePAfc9FYqZIT6.arm6.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads