Analysis
-
max time kernel
152s -
max time network
20s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
02/12/2024, 02:11
Behavioral task
behavioral1
Sample
1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf
Resource
debian12-mipsel-20240221-en
5 signatures
150 seconds
General
-
Target
1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf
-
Size
24KB
-
MD5
607c200e315019f8b1b9b92fd834c78a
-
SHA1
d158c0b976f0c23ab6c720ab2e3871247644301a
-
SHA256
1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf
-
SHA512
4b4fb199853b866ecfcde646d93320d795dfe56c567ed7dd807e916b4d31b70169bc996ea4a42d7441edcee23d947dc7a58498544718080faad61f332b57d8aa
-
SSDEEP
768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBp6ZqSWvC:4QlS07FUXqIYSXQKquOq6
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for modification /dev/misc/watchdog 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for modification /bin/watchdog 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf -
description ioc Process File opened for reading /proc/766/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/768/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/431/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/691/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/713/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/731/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/693/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/720/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/748/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/690/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/772/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/710/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/717/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/718/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/730/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/409/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/410/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/618/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/622/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/744/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf File opened for reading /proc/788/cmdline 1e3f80c8261c41bab34a2be4c95006fe48b62e5db23e8d24c264c320d8e65fcf.elf