Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    11-01-2025 22:47

General

  • Target

    camp.arm7.elf

  • Size

    60KB

  • MD5

    c50ecdec197ebefe1029061c6035b7a0

  • SHA1

    0a5792448cfc8993eac469a77a2f58b2d2f9892b

  • SHA256

    9ffe24af76cb6bfd845b71da575c0a90cbc0a0e4fe2e3686fe6c8d43addbfceb

  • SHA512

    d9b8da1791dc14c0fdffdb8e49a76fbc4dca10e5d9a38accbb5bc6ed370cfdcc9285354d3bf0d0d519540682bb9fdbf00327d1f8763a61dcd341532d6fba8e27

  • SSDEEP

    1536:gVQSmwtMJXmejtgYeTLTM5Tfv83KJ2crl2EWB:gVywt8XZgLgTX83KHl2EWB

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/camp.arm7.elf
    /tmp/camp.arm7.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:658

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads