Analysis
-
max time kernel
149s -
max time network
2s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
01-01-2025 01:12
Behavioral task
behavioral1
Sample
6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf
Resource
debian9-mipsbe-20240611-en
debian-9-mips
5 signatures
150 seconds
General
-
Target
6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf
-
Size
31KB
-
MD5
2af268efed968357e391ab576fc973c4
-
SHA1
90d2eb946f39110a1a1768de197d5b2592c32906
-
SHA256
6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae
-
SHA512
753e6159a6085f846ad7bc6cddf5d0eae592351ada2b344fdbd8c0ce2b6981746b579085f373634adcbd29668cf9ce1979fa7a5f58f05f5bbee6f5405e52c4f1
-
SSDEEP
768:hROI+KZnfryc3i9gtz8ubtmMP1USJgGlzDpbuR1JO:ywnDVYuxmMuWVJuY
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for modification /dev/misc/watchdog 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for modification /bin/watchdog 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf -
description ioc Process File opened for reading /proc/671/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/698/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/705/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/734/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/779/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/667/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/675/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/685/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/703/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/712/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/717/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/787/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/432/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/674/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/699/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/704/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/748/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/767/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/771/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf File opened for reading /proc/799/cmdline 6f4b2ca72110e08f4a14ccfe634cfe7296914e8e8c65e4de037d3c85f40101ae.elf