Analysis

  • max time kernel
    136s
  • max time network
    149s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    26-12-2024 21:02

General

  • Target

    ub8ehJSePAfc9FYqZIT6.arm7.elf

  • Size

    60KB

  • MD5

    f271d1cc3218b4dcc37552bbe124a9ac

  • SHA1

    401f3fd0c36e9fadf26f68215fc4d8ec0cb7520d

  • SHA256

    cf9eef8908317bc94a408e9ef19c06da1c032573a6bef34b72562a7fa43fa52f

  • SHA512

    24b32bce34558d57b29fb48df1a7cce94a24bcbdd9637433be4dbc751fda1f97f12d3be29cf4b4e6666b8908ef895d9ef838d337499c49cba16293fab986a636

  • SSDEEP

    1536:17XduYshWhq/HIEy6Og3Nwz9hAyxBLSM5Tfv83KJGTb6R4/:xdpssMPR9w4yrLXTX83K0Tb6R0

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ub8ehJSePAfc9FYqZIT6.arm7.elf
    /tmp/ub8ehJSePAfc9FYqZIT6.arm7.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:701

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads