Analysis
-
max time kernel
149s -
max time network
5s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
03-01-2025 03:50
Behavioral task
behavioral1
Sample
a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf
Resource
debian9-mipsel-20240611-en
debian-9-mipsel
5 signatures
150 seconds
General
-
Target
a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf
-
Size
28KB
-
MD5
8c75550d786b77cbd6126f52ff6f8ff7
-
SHA1
2920bd07503926c516e85dc9a98b1b83f8083eea
-
SHA256
a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81
-
SHA512
950af43188f89a88529fd2e9a1083f8206db21def824d11fba815cc3306bfcd60a2582d0be268fc5fa0802447da830a3c0a2c494802c78c3e34a4fa0040e5a23
-
SSDEEP
384:1mjOb/7xg3HAp0nwcOESKAhKDn459qfUscwA/75xPuC6DGCabvT95am2x/LmNbRj:aObTx2HrZOKAhn4UswxPu3GdZ5YZLSWO
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for modification /dev/misc/watchdog a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for modification /bin/watchdog a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf -
description ioc Process File opened for reading /proc/681/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/703/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/808/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/435/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/669/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/738/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/753/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/771/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/682/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/709/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/718/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/752/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/783/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/702/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/707/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/708/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/714/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/717/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/775/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/807/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/676/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf File opened for reading /proc/684/cmdline a8930215628e0389114fe87a6fc5912bd12392c3107733643d3cfc853c542b81.elf