Analysis

  • max time kernel
    149s
  • max time network
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-01-2025 02:37

General

  • Target

    7519ad77ca24c0c44cfeb3677b8c6a51d540a114c7f4a50c8fdda00e0d1eafea.elf

  • Size

    21KB

  • MD5

    5424315fe64b305382a10ce93ed223b5

  • SHA1

    d8e57e67aa337c3bfbfcb4780863e09dd7c0ff40

  • SHA256

    7519ad77ca24c0c44cfeb3677b8c6a51d540a114c7f4a50c8fdda00e0d1eafea

  • SHA512

    4af0a35b12edd25207c2b7a7c827b140a5c54ae9866db34252bb63cdd05f13107555771a595f72ce4a2e7d6cd8816595dc5dc1e9fcd9f759a117fa3a432d9846

  • SSDEEP

    384:vvtIoZxrSniaXs+qx+bwqPX+VOcFd5fHq52lxjJ3hymdGUop5hU+:vvQn4j+ZO5fKAlxRs3Uozy+

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 31 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7519ad77ca24c0c44cfeb3677b8c6a51d540a114c7f4a50c8fdda00e0d1eafea.elf
    /tmp/7519ad77ca24c0c44cfeb3677b8c6a51d540a114c7f4a50c8fdda00e0d1eafea.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:643

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads