Analysis
-
max time kernel
149s -
max time network
5s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
10-01-2025 02:21
Behavioral task
behavioral1
Sample
438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf
Resource
debian9-mipsbe-20240418-en
debian-9-mips
5 signatures
150 seconds
General
-
Target
438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf
-
Size
27KB
-
MD5
71200d52dd36826b19f6d6c298130a3f
-
SHA1
314dfad61264473be7368c45286d9ae76358d4cc
-
SHA256
438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268
-
SHA512
41628f383208e0a9f3429a57c77b142e400729f85738f7c57d4188da60dda146f71e4c227d2fecef4f64d55770535ff610352f8b690e8d3b0885369b6bb2d527
-
SSDEEP
768:T5ZSsgv/IkCuLSmFEMWB3l+sEyVJgGlzDpbuR1JQt:VZSs4IkCuJeUslVJuy
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for modification /dev/misc/watchdog 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for modification /bin/watchdog 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf -
description ioc Process File opened for reading /proc/412/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/668/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/711/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/663/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/782/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/769/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/770/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/774/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/687/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/701/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/706/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/722/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/665/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/667/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/710/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf File opened for reading /proc/718/cmdline 438aa73c7b25359f8f7e32e8946f86695d2968348d3070b6cf8e6fde3fd45268.elf