Analysis
-
max time kernel
150s -
max time network
3s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
10-01-2025 02:26
Behavioral task
behavioral1
Sample
529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf
Resource
debian9-mipsbe-20240611-en
debian-9-mips
5 signatures
150 seconds
General
-
Target
529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf
-
Size
27KB
-
MD5
0183ecffa78b2afe29ef8d4d58e96c01
-
SHA1
ca4b7cff5f7a2aa123175f8c04bc8f70ee2444cb
-
SHA256
529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0
-
SHA512
b2f1b8ca55cfe3d0fc41d6078687ae11d1834147dd5dfa931708bdad8ab98c4260bf75f01d3372b658b8361ebde36908ca52cb42e7ea486b21b83542107513e2
-
SSDEEP
768:h5ZSsgv/IkCuLSmFEMWB3l+sEJgGlzDpbuR1JQN:zZSs4IkCuJeUs8VJui
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for modification /dev/misc/watchdog 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for modification /bin/watchdog 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf -
description ioc Process File opened for reading /proc/724/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/414/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/668/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/677/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/687/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/701/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/706/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/738/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/744/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/771/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/783/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/784/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/810/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/678/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/702/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/708/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/713/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/789/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/809/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/671/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/707/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/716/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/770/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf File opened for reading /proc/775/cmdline 529e40b98202d1b2dc78a0cb05f2e4436cbe368e1604207b618089e0e90a97e0.elf