Analysis

  • max time kernel
    149s
  • max time network
    7s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    09-12-2024 03:00

General

  • Target

    ee48906e6d44a608ba40cc35ae29d5059b565c6703e0b524b2b87c1eceaa0b21.elf

  • Size

    23KB

  • MD5

    54a4579132c974352d3b871e4ccc5823

  • SHA1

    ce87e93203266a9371fc6a24d0bbc01681de26d4

  • SHA256

    ee48906e6d44a608ba40cc35ae29d5059b565c6703e0b524b2b87c1eceaa0b21

  • SHA512

    45a2eb61611afc33cd1e6faa79ef31a7089070373acb66954b70b32ad89017f81420bcb1449e4af1f7f7bb6ae5097692af57247235c641b474012eb3cee3f02f

  • SSDEEP

    384:6eD8ZSH2LLZUYyGZbsOiTrowSN9rnZMINlphQ/HYtuiBwmd1JgGlzDpH7uNj1JAn:6eD8ZSWvZHZbs1row697qohQvg9mi1JR

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 22 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ee48906e6d44a608ba40cc35ae29d5059b565c6703e0b524b2b87c1eceaa0b21.elf
    /tmp/ee48906e6d44a608ba40cc35ae29d5059b565c6703e0b524b2b87c1eceaa0b21.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:719

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads