Analysis
-
max time kernel
150s -
max time network
18s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240729-en -
resource tags
arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
19-12-2024 03:58
Behavioral task
behavioral1
Sample
c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf
Resource
debian12-mipsel-20240729-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf
-
Size
24KB
-
MD5
ce4b3ce3996d62b77ab59059e05e7f7b
-
SHA1
c2884e004155fcccdb3e6dceca5fc73e9ebca1c7
-
SHA256
c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9
-
SHA512
f8502b6866c80f83d41b2e866682cca999b0311d59c765f3dfd549d5406f5646d5a9815964087192129a633d62911624cb396b6799f263110cfbf1812635892b
-
SSDEEP
768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBpDiZqSWvQ:4QlS07FUXqIYSXQKquCqY
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for modification /dev/misc/watchdog c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for modification /bin/watchdog c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf -
description ioc Process File opened for reading /proc/784/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/427/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/661/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/671/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/672/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/696/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/717/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/722/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/757/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/425/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/428/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/694/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/699/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/711/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/737/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/738/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/714/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf File opened for reading /proc/749/cmdline c7f2f9f6b4925428f02765882377ddcb3e81877d12ee972f71334a32f5c19ad9.elf