Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    03/12/2024, 02:42

General

  • Target

    8815c224d2e4d5b8f00c1e1909565e7571477a1af936a783d6cb7b23a90509dd.elf

  • Size

    43KB

  • MD5

    e0a3908895c93452cc578571a518a78d

  • SHA1

    782bfef6f4e2af5c61d70936a4d2546400614b08

  • SHA256

    8815c224d2e4d5b8f00c1e1909565e7571477a1af936a783d6cb7b23a90509dd

  • SHA512

    597c842d99d80b0debe91da507d748e537cf083a41674118ff779e7e684f85db12996e37e13c65c0e456f1b2b90c6d2717f281038a0a79171c05676c5a671ef5

  • SSDEEP

    768:3wZyKJoofyfTtMLfclRAAO+jVbumZnLM3XgcTaWS5HOFk7SG9q3UEL2:UbjjOAgfnLGRMOSSrL2

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/8815c224d2e4d5b8f00c1e1909565e7571477a1af936a783d6cb7b23a90509dd.elf
    /tmp/8815c224d2e4d5b8f00c1e1909565e7571477a1af936a783d6cb7b23a90509dd.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:666

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads