Analysis
-
max time kernel
150s -
max time network
10s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240729-en -
resource tags
arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
31-12-2024 02:47
Behavioral task
behavioral1
Sample
9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf
Resource
debian12-mipsel-20240729-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf
-
Size
32KB
-
MD5
e30368ed86531051ae95d0ba79d33d7e
-
SHA1
cb69227ff998e24c588e67968e6c38437b939524
-
SHA256
9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c
-
SHA512
740d00a37517473848c32c8dc957f1974c801f9279ccbc83ffcaea89ed1c94b292d6e52540565c819f88eb9c7ddc1634e116685c7063f7f7a459c5c100a2f795
-
SSDEEP
768:Xky7pBOnQthzk8Ya7Fb4ARL1wZK8wTSWujfLm6Wa:Upn4z9Ygb4A51b477L7
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for modification /dev/misc/watchdog 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for modification /bin/watchdog 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf -
description ioc Process File opened for reading /proc/723/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/739/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/751/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/788/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/699/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/431/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/681/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/682/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/712/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/406/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/669/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/697/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/738/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/758/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/408/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf File opened for reading /proc/719/cmdline 9edcacfbfbb25cd2864e431738ec6d8085b5ec241400943b4cc2c9ea7a2fe67c.elf