Analysis
-
max time kernel
150s -
max time network
155s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240418-en -
resource tags
arch:mipselimage:debian12-mipsel-20240418-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
27-12-2024 02:38
Behavioral task
behavioral1
Sample
a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf
Resource
debian12-mipsel-20240418-en
General
-
Target
a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf
-
Size
31KB
-
MD5
9b73eb8559c4fd0e08ff4633ad6e3ea9
-
SHA1
ac67015a4818aee4716952357b6ea54f128474d5
-
SHA256
a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a
-
SHA512
5f21c3d51ff22e45ead4d91c9bd093e542742da3e0e332f2c175e39be9eb22ab6c1cd16d58874db07753b83298010a584146aad1dcf8b5a6fad5a94cbd4a5cba
-
SSDEEP
384:X3fpCLrsjHIX69URc+hmnulY1qHprFKt6zhS45vDajssVwf8ynUAVa39RWGVCz09:nfpWcehzJFYKgULAssKfFBa3LWS
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Contacts a large (20302) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for modification /dev/misc/watchdog a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf -
description ioc Process File opened for reading /proc/318/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/399/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/672/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/692/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/716/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/732/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/673/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/181/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/202/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/744/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/404/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/678/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/1/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/356/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/380/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/382/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/384/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/720/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/394/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/403/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/404/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/747/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/695/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/755/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/775/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/436/fd a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/403/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/710/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf File opened for reading /proc/733/exe a7a63f861864ca132089d86bd050bd692f0f2c1d204ce12f7622f74ff133521a.elf