Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    02/12/2024, 19:02

General

  • Target

    ub8ehJSePAfc9FYqZIT6.arm6.elf

  • Size

    43KB

  • MD5

    e0a3908895c93452cc578571a518a78d

  • SHA1

    782bfef6f4e2af5c61d70936a4d2546400614b08

  • SHA256

    8815c224d2e4d5b8f00c1e1909565e7571477a1af936a783d6cb7b23a90509dd

  • SHA512

    597c842d99d80b0debe91da507d748e537cf083a41674118ff779e7e684f85db12996e37e13c65c0e456f1b2b90c6d2717f281038a0a79171c05676c5a671ef5

  • SSDEEP

    768:3wZyKJoofyfTtMLfclRAAO+jVbumZnLM3XgcTaWS5HOFk7SG9q3UEL2:UbjjOAgfnLGRMOSSrL2

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ub8ehJSePAfc9FYqZIT6.arm6.elf
    /tmp/ub8ehJSePAfc9FYqZIT6.arm6.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:703

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads