Analysis

  • max time kernel
    149s
  • max time network
    5s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    15-12-2024 04:10

General

  • Target

    f195cdd4036cac5a1da990f18b46e73b3cdcbde669481662b077c03ba5eea080.elf

  • Size

    23KB

  • MD5

    040d6bf67864ae8cdec915537bbabe6d

  • SHA1

    a78ebe1b49ee4a728974f8a14e9590cb89d74290

  • SHA256

    f195cdd4036cac5a1da990f18b46e73b3cdcbde669481662b077c03ba5eea080

  • SHA512

    ab7eca411658de8c11bd6c74342d1b05d856a96e29dad11c1e7623967a97476caac341003f268cf2afe0e2587d6434504210bbeac830ba12ca46e51371b591fc

  • SSDEEP

    384:neD8ZSH2LLZUYyGZbsOiTrowSN9rnZMINlphQ/HYtuiclmdzJgGlzDpH7uNj1JA3:neD8ZSWvZHZbs1row697qohQvg9MizJx

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 22 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f195cdd4036cac5a1da990f18b46e73b3cdcbde669481662b077c03ba5eea080.elf
    /tmp/f195cdd4036cac5a1da990f18b46e73b3cdcbde669481662b077c03ba5eea080.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:706

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads