Analysis
-
max time kernel
150s -
max time network
11s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
19-12-2024 03:33
Behavioral task
behavioral1
Sample
a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf
Resource
debian12-mipsel-20240221-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf
-
Size
28KB
-
MD5
ef10dc4a6fc9356e5acd9b99fec49998
-
SHA1
1d51699f425ed8416d546d3c02721330fc5e0b56
-
SHA256
a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9
-
SHA512
a5fd1c65a4812f6604b3c71330c28502ffaf16b56b5e3c0ce50731acd924ff9522a167d9cb4da5f2907fc8a0815a9d814bc08dc93ea2329671a30bcae467444b
-
SSDEEP
384:aE/wPMcOSFRzDFp2aaUn8Rcf3ljpppSen3euOFXN8h6nR+eQ3diZFt9oQ4Ogv7Ro:Z/wPHFRBaU86tj4N78wnR83d5JDvlWF
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for modification /dev/misc/watchdog a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /bin/watchdog a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for modification /sbin/watchdog a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf -
description ioc Process File opened for reading /proc/697/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/732/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/405/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/698/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/711/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/733/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/444/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/667/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/679/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/718/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/754/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/407/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/680/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/705/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/721/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf File opened for reading /proc/748/cmdline a2a9e34a79104ae239a27d7162d4a98e638f7e212710e1038d372dffb85d6ba9.elf