Analysis

  • max time kernel
    149s
  • max time network
    5s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    21-12-2024 02:43

General

  • Target

    76d7af99772629dd840094eb0a734c7a2dab96b92d21a0b3b4ee03f7ad6a4591.elf

  • Size

    27KB

  • MD5

    e56fb781866a7ae2e01d340d88b94976

  • SHA1

    384c693ffce3b453c9e1d969caa925b785fdfd25

  • SHA256

    76d7af99772629dd840094eb0a734c7a2dab96b92d21a0b3b4ee03f7ad6a4591

  • SHA512

    6f0a803e4e941dc6eec144f6726bdb71014bda1273a02da01a422c4a9d629b99bc35aa3f55d3d5be729b4336b2ffbeaae9d02285190c65331da6c06ec5188154

  • SSDEEP

    768:doltRHOi0optXiZ09WU0qHyerhZYRYKzYKjpJgGlzDpbuR1J4:Klf3ptXiW939OVYKjbVJu+

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 22 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/76d7af99772629dd840094eb0a734c7a2dab96b92d21a0b3b4ee03f7ad6a4591.elf
    /tmp/76d7af99772629dd840094eb0a734c7a2dab96b92d21a0b3b4ee03f7ad6a4591.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:717

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads