Analysis
-
max time kernel
150s -
max time network
7s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240729-en -
resource tags
arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
10-01-2025 01:19
Behavioral task
behavioral1
Sample
3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf
Resource
debian12-mipsel-20240729-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf
-
Size
24KB
-
MD5
4c239b88c1d333308ed42706769d14c6
-
SHA1
3c6ebc5b02673e2b03447facebf724a1db297ce4
-
SHA256
3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3
-
SHA512
b0496f6441cb5ff7a12e62d30adaf5e117ad0f981d79aec8fcb0e716bdab7d6d8c4f5bebfe4fcf0b597a9f95d3c9a25e1159f2ae287429dc4991e18882a2282d
-
SSDEEP
768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBpIpZqSWvR:4QlS07FUXqIYSXQKquwq5
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for modification /dev/misc/watchdog 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for modification /bin/watchdog 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf -
description ioc Process File opened for reading /proc/439/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/700/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/719/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/762/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/664/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/712/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/736/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/735/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/750/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/679/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/681/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/697/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/682/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf File opened for reading /proc/723/cmdline 3cdfe20a0f79e0d552fddb5d7a881725ac4dd8312e433a65990b55adafd2c0b3.elf