Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    06-01-2025 03:29

General

  • Target

    fd10a50ccf70d368c85c2423b474aff7d6532453261e30b08770587e1bea8fdc.elf

  • Size

    38KB

  • MD5

    1e8570a760413231dba2468cd964b4c8

  • SHA1

    ed5b6c4789b297b469a67ab06fae2515d10337cc

  • SHA256

    fd10a50ccf70d368c85c2423b474aff7d6532453261e30b08770587e1bea8fdc

  • SHA512

    f2cd2daed1fc0ac22cfd9ed9e238278d2a00166fe2dcc61d183467d71e3cfe3c1ba376de44dd5b22fccad704def523c904fae306a0b6906941c050e65c167768

  • SSDEEP

    768:dg2h8tG9BjEdBO240aMS3ZisCoz7BKv/J4kbs3UozUl:qFSea2opKHJ4jzUl

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/fd10a50ccf70d368c85c2423b474aff7d6532453261e30b08770587e1bea8fdc.elf
    /tmp/fd10a50ccf70d368c85c2423b474aff7d6532453261e30b08770587e1bea8fdc.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:645

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads