Analysis
-
max time kernel
153s -
max time network
30s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
10-01-2025 02:43
Behavioral task
behavioral1
Sample
89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf
Resource
debian12-mipsel-20240221-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf
-
Size
28KB
-
MD5
0d39982b3aa657376d573e11cdd40ff9
-
SHA1
a96d5595a0c3a16cc135a7de6fa1d0dca6b53963
-
SHA256
89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803
-
SHA512
4f78ee3aa16dffcfc296fe38e1f2c59ad6aa037897f565d745c088fddcef3eef47c9ef3cf166275691eb56874c0b8e621e0a40365df4250f86966e9d7374d191
-
SSDEEP
384:XmjOb/7xg3HAp0nwcOESKAhKDn459qfUscwA/75xPuC6DGCabvT95am2xzjnRWGw:YObTx2HrZOKAhn4UswxPu3GdZ5YRlWZ
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for modification /dev/misc/watchdog 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for modification /bin/watchdog 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf -
description ioc Process File opened for reading /proc/743/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/775/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/786/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/409/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/690/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/691/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/713/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/764/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/710/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/730/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/748/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/761/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/719/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/790/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/431/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/618/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/709/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/716/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/762/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/779/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/787/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/410/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/622/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/693/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf File opened for reading /proc/731/cmdline 89c00dd16ffc08e8abe400ca834200540c422cb45af8a14a8bdc3b50b0da2803.elf