Analysis

  • max time kernel
    149s
  • max time network
    11s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    02/12/2024, 00:18

General

  • Target

    ub8ehJSePAfc9FYqZIT6.mips.elf

  • Size

    27KB

  • MD5

    f43afab6ef81a2d16e324d4fe443ce68

  • SHA1

    21fa1cb8e027e3b00dcf6e7eda11108dab8383d6

  • SHA256

    6a27b0ad9aafa3dfe2757bfdbbfbc9f8c3a096167fe8754a82066db12081b395

  • SHA512

    352120f50e0771b84fd205f8d72b921161b2abdade2c4d831cbcaf90b19256ed26f465d3535408e35f210e57fbc8adf78a82c171a45ae2129fc8b5828bc12389

  • SSDEEP

    768:+jeoUBsec9GwPgD/ZzRD8QmP03uIJgGlzDpbuR1Jr:yeogsec9o/ZzZEc3rVJut

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 32 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/ub8ehJSePAfc9FYqZIT6.mips.elf
    /tmp/ub8ehJSePAfc9FYqZIT6.mips.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    • System Network Configuration Discovery
    PID:705

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads