Analysis
-
max time kernel
43s -
max time network
152s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
06-01-2025 02:23
Behavioral task
behavioral1
Sample
2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf
-
Size
32KB
-
MD5
675ff21eade2513ba3b1e820889659d4
-
SHA1
dcd860925821d705ed6c9f7903266a4488b9bc36
-
SHA256
2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d
-
SHA512
34a73cefe1eddb9033870ee0604f2daa4b1aae2b7cb67cc82cc49852d69306f165815c1305da24570851a59276ee5a80d9b336b171b975c9b9b3eb7defa25ab0
-
SSDEEP
768:L4nfDhOZWJZZOUWQH3XVe75rJgGlzDpUYsUB:8rqazOwH3lAVqYR
Malware Config
Extracted
mirai
UNSTABLE
Signatures
-
Mirai family
-
Contacts a large (150136) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for modification /dev/misc/watchdog 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for modification /bin/watchdog 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 707 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf -
description ioc Process File opened for reading /proc/self/exe 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/685/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/699/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/705/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/713/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/782/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/716/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/667/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/674/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/675/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/700/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/706/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/712/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/432/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/743/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/770/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/774/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/671/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/704/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/711/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/717/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/737/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf File opened for reading /proc/805/cmdline 2e3707b84c691b4c68d2826be50ece7ce989a9eed1076cc8a36e45359f63e96d.elf