Analysis

  • max time kernel
    149s
  • max time network
    11s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01/12/2024, 09:02

General

  • Target

    boatnet.arm.elf

  • Size

    21KB

  • MD5

    88e8850169a42720de0ee619575e43ec

  • SHA1

    82cea4b59e1fb1ea8b4090113a16dbdc7b0e70f3

  • SHA256

    848893915d88849196906abfb8fa7a8fa9fc561c8d7f6800344dc722cf057036

  • SHA512

    762eb669265a51c92dc3f10e9739faedd4d034011269b9ac5ae9c5411f2d4321f558805fa1954308eef873bb8fa6385fd5fcd11043f38ae59cace43c292adbcb

  • SSDEEP

    384:UvtIoZxrSniaXs+qx+bwqPX+VOcFd5fHq52lxjnTG3gMhymdGUop5h+:UvQn4j+ZO5fKAlxXAgMs3UozM

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 34 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/boatnet.arm.elf
    /tmp/boatnet.arm.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:658

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads