Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14-11-2024 03:13
Behavioral task
behavioral1
Sample
e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf
Resource
debian9-armhf-20240611-en
General
-
Target
e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf
-
Size
61KB
-
MD5
b5c3047b6f517981a80e6e8910f97e7f
-
SHA1
e63b84208378269256923b55ae761800207c0e7e
-
SHA256
e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17
-
SHA512
554bffaeb5ca19eb36776bb01a3a2e793cb63e4ee23eaa8d3c258d94124a04b5e0c6b496c119f387826fe3afde9fec395ad1b41487076fb18b94cd435fbcb31f
-
SSDEEP
1536:gz3fTxnj8Uz2WY4aubeMIR02jRp13D0SOj5fiU:GrxjzztY4FgRntyliU
Malware Config
Extracted
mirai
MIRAI
Signatures
-
Mirai family
-
Contacts a large (23828) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
Processes:
shchmodpid process 641 sh 652 chmod -
Changes its process name 1 IoCs
Processes:
e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/watchdog 639 e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf -
Processes:
mve2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elfmkdirdescription ioc process File opened for reading /proc/filesystems mv File opened for reading /proc/self/exe e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/watchdog sh
Processes
-
/tmp/e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf/tmp/e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf1⤵
- Changes its process name
- Reads runtime system information
PID:639 -
/bin/sh/bin/sh -c "rm -rf bin/watchdog && mkdir bin; >bin/watchdog && mv /tmp/e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf bin/watchdog; chmod 777 bin/watchdog"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:641 -
/bin/rmrm -rf bin/watchdog3⤵PID:643
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:645
-
-
/bin/mvmv /tmp/e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17.elf bin/watchdog3⤵
- Reads runtime system information
PID:649
-
-
/bin/chmodchmod 777 bin/watchdog3⤵
- File and Directory Permissions Modification
PID:652
-
-