Analysis
-
max time kernel
0s -
max time network
2s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
13-11-2024 14:32
Static task
static1
General
-
Target
dlr.mips.elf
-
Size
1KB
-
MD5
b48716f83d04b04f8744493d7e042f57
-
SHA1
da9c1a0245acbed53ee47fc919f010e999b4092b
-
SHA256
7387bdd216fb5604f8478cf0203ee0f8f4aa4efa1e69ddc703768a19dc6452eb
-
SHA512
1bff62b405767467dfb767515d0872ee20b2496c00d5ff4f5681d30f07ffc6de1664e7a385cc86e074be02914d83bdda56a1c5b4561de395b7a70a561eda54fb
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 711 dlr.mips.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/byte dlr.mips.elf
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5442269900f28ef10d8b7a13f2bc5ed86
SHA12f997966590600fb4b5572f306a40bcbb6fe79eb
SHA256a1badb5317009fe55702c638b0c5816a92337e855e83db12e99e721db7b193c3
SHA512d861babc3d83bf705aa5efd5276e928d6335eabfe58c604968315f865ae1765fe9b099b21de8045b3acfc6b66b5c384ec39888dd72d69bc4105703cff9e19db1