Analysis

  • max time kernel
    149s
  • max time network
    7s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240418-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    16-12-2024 02:07

General

  • Target

    215af14d531524b2625842b3c5e53194eca55e8b072553ace83bc7ecf4feac33.elf

  • Size

    23KB

  • MD5

    923e062add0e0cddb1e650f53680b100

  • SHA1

    15990f11a27c06d106f8b5566f932de669ca682f

  • SHA256

    215af14d531524b2625842b3c5e53194eca55e8b072553ace83bc7ecf4feac33

  • SHA512

    13453fed6f9fa9ae72e6a3af4b51f60107ce3f5155f3b1dbc3e23cc2b185b1692546f347fe9d43a12c55b7bdf8f9df9d389e8e3973fc8b79dc9a01f4e5a65397

  • SSDEEP

    384:teD8ZSH2LLZUYyGZbsOiT/5qZB4FQdhL8d/QQ3m6xcJyumdrJgGlzDpH7uNj1JA4:teD8ZSWvZHZbs1/k0M8d/QA0yuirJgGC

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 24 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/215af14d531524b2625842b3c5e53194eca55e8b072553ace83bc7ecf4feac33.elf
    /tmp/215af14d531524b2625842b3c5e53194eca55e8b072553ace83bc7ecf4feac33.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:726

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads