Analysis
-
max time kernel
69s -
max time network
152s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
30-12-2024 02:30
Behavioral task
behavioral1
Sample
8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf
-
Size
35KB
-
MD5
42ee2e4502d9dc6d5296f96907dfd2d7
-
SHA1
a2a7ad1ccfe374dbc6709390f1c6d0250bceec6c
-
SHA256
8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0
-
SHA512
6ee578d25631be7c843724dd5b7b55794455c0d7dc39d38c9d5cb8ef8412464c5cc707d9fd2b259d8616b40d19e1f69ea4ab1fe02c97b56cba5195364200b887
-
SSDEEP
768:2SUl3dSMnbPoGbT55n7OZ7Hj2Y4GAU04FIbjNH9R+JgGlzDpUYse:2nhjbPoyTYDB4clmNiVqYF
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
Contacts a large (98140) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for modification /dev/misc/watchdog 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for modification /bin/watchdog 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 708 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf -
description ioc Process File opened for reading /proc/802/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/687/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/701/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/707/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/751/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/755/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/706/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/713/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/743/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/777/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/820/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/self/exe 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/776/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/799/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/811/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/677/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/768/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/772/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/808/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/667/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/714/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/700/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/715/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/739/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/773/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/824/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/803/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/816/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/671/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/676/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/705/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/785/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/798/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/416/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/712/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/721/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf File opened for reading /proc/752/cmdline 8f3a43458b1db0e059023feb483fffd20460f3acba03b05786555be10d1cfcb0.elf