Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240418-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    24-12-2024 01:38

General

  • Target

    3b6b160ecfbb8c22f91a08708aa0a73917ddcfbf15c628af30e3c34257825aae.elf

  • Size

    37KB

  • MD5

    a010ddf965c0b627abe851fced83e6fe

  • SHA1

    5fe8eabdce3d9ef71ff19a7fc109b841a958e328

  • SHA256

    3b6b160ecfbb8c22f91a08708aa0a73917ddcfbf15c628af30e3c34257825aae

  • SHA512

    d432b1469b70044a3ca0b61ab8b4294ce89fb53e7991fa14c8b7c06728a46ae81cad82f401dd87ca2e286e2e0e0669380c7cda0a534525cd0831aa2d9d1cdf9c

  • SSDEEP

    768:XyI187beFSc+RX4qCw7kwGDGRfHB/8gEzJgGlzDpbuR1Jq:Xyf7beMbIqCw7jcGXCpVJu8

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/3b6b160ecfbb8c22f91a08708aa0a73917ddcfbf15c628af30e3c34257825aae.elf
    /tmp/3b6b160ecfbb8c22f91a08708aa0a73917ddcfbf15c628af30e3c34257825aae.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:710

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads