Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    ubuntu-24.04_amd64
  • resource
    ubuntu2404-amd64-20240523-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system
  • submitted
    21-12-2024 03:00

General

  • Target

    b699d1673c8dc2346ef917bce6367081777700322c740c736cc10b3c8a28cdba.elf

  • Size

    22KB

  • MD5

    957ea75ddf1944fd680e923628a7a5d3

  • SHA1

    4852bf8573d343edbcaabdd7a62b1768e8cea4cb

  • SHA256

    b699d1673c8dc2346ef917bce6367081777700322c740c736cc10b3c8a28cdba

  • SHA512

    de98e358bc5cce88425078f57564e9d1db26916c3ef4b35cdb1f3fc1e0340d689ebc2cc0797cf20c4d7cbb86d99afba5d2f6599c7143423190e322b408b43e25

  • SSDEEP

    384:pFYfwf/izXcR3fivuQUhJX9tDttg9D4cbJYjg5zl35j3kpt1hTzKk+xzN2lM5B7C:HikKzXctauJX9tyBmCR3V3kL+ZxzNSM2

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/b699d1673c8dc2346ef917bce6367081777700322c740c736cc10b3c8a28cdba.elf
    /tmp/b699d1673c8dc2346ef917bce6367081777700322c740c736cc10b3c8a28cdba.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:2766

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads