Analysis
-
max time kernel
151s -
max time network
9s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240729-en -
resource tags
arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
06-01-2025 03:14
Behavioral task
behavioral1
Sample
d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf
Resource
debian12-mipsel-20240729-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf
-
Size
24KB
-
MD5
c37ecb46ae324008a733e16138c567fc
-
SHA1
34f5a1b3dbfd0436c02a9352b408d14f6ca2a92a
-
SHA256
d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60
-
SHA512
0475acb8cbbfc842e3e889eeeb06d81fea8bb95d056a87e110b945d3fdc2f6f327a10df08d71f17a16325368623299af9bddf2ab5fd9a14f6e419b4db6806317
-
SSDEEP
768:gDrQlS07dEv0UXqUhvQE+CXQKMQKCXBpyzZqyWvE:oQlS07FUXqIYSXQKqu0qc
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for modification /dev/misc/watchdog d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /bin/watchdog d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for modification /sbin/watchdog d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf -
description ioc Process File opened for reading /proc/664/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/439/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/697/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/734/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/735/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/712/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/719/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/750/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/679/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/681/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/682/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/700/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/723/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf File opened for reading /proc/748/cmdline d427cd5ac2c772a3c95a1615737508252dec671df6bcf526ab206b9770aa5a60.elf