Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    24-12-2024 05:38

General

  • Target

    b105e2e16e62e0156c93ec6adb3786aac39387b326c151bd4740e705a7ab99e4.elf

  • Size

    43KB

  • MD5

    50bf10e8cdfe9739c0cf974778e0bda1

  • SHA1

    212c2d9325b1c4a04ab78073f9094ff0010d3e6e

  • SHA256

    b105e2e16e62e0156c93ec6adb3786aac39387b326c151bd4740e705a7ab99e4

  • SHA512

    3db5b2334a7c5d966ed36c4ea61c31e5938e07aae63ece079ac421f60e83caca5ab3f4ec73279378cc95b2dc7e214912c2caeb42426c4cd00a4d9ebc28c65c74

  • SSDEEP

    768:G7ph1LjFGpx652lJXasyEk6JGbr6MWiNIx8FrQPLS8JgGlzDpbuR1JXU:GzA65yk6JGbrbNwQ8m0VJui

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/b105e2e16e62e0156c93ec6adb3786aac39387b326c151bd4740e705a7ab99e4.elf
    /tmp/b105e2e16e62e0156c93ec6adb3786aac39387b326c151bd4740e705a7ab99e4.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:699

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads