Malware Analysis Report

2024-12-07 19:59

Sample ID 241114-dj676asqgs
Target bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf
SHA256 bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27
Tags
mirai credential_access defense_evasion
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27

Threat Level: Known bad

The file bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf was found to be: Known bad.

Malicious Activity Summary

mirai credential_access defense_evasion

Mirai family

Modifies Watchdog functionality

Reads process memory

Changes its process name

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-14 03:03

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-14 03:03

Reported

2024-11-14 03:05

Platform

debian9-mipsel-20240729-en

Max time kernel

149s

Max time network

148s

Command Line

[/tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf]

Signatures

Modifies Watchdog functionality

defense_evasion
Description Indicator Process Target
File opened for modification /dev/watchdog /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for modification /dev/misc/watchdog /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A

Reads process memory

credential_access
Description Indicator Process Target
File opened for reading /proc/682/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/709/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/713/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/714/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/715/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/721/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/452/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/683/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/688/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/692/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/769/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/770/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/724/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/693/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/708/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/719/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A
File opened for reading /proc/726/maps /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself a /tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf N/A

Processes

/tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf

[/tmp/bf083f4182e1facde7503bd0465b0799e00cadfa75d0bd814923b852b579fb27.elf]

Network

Country Destination Domain Proto
US 8.8.8.8:53 193.84.71.119 udp
US 8.8.8.8:53 193.84.71.119 udp
US 8.8.8.8:53 193.84.71.119 udp
US 8.8.8.8:53 193.84.71.119 udp
US 8.8.8.8:53 193.84.71.119 udp
US 193.84.71.119:38241 tcp

Files

N/A