Analysis
-
max time kernel
149s -
max time network
5s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
11/01/2025, 01:07
Behavioral task
behavioral1
Sample
c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf
Resource
debian9-mipsbe-20240418-en
5 signatures
150 seconds
General
-
Target
c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf
-
Size
23KB
-
MD5
5d6258afa5f961b3fa073a1600f092af
-
SHA1
ecf5abcc547b8f37500e54f28158087c511fdbac
-
SHA256
c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4
-
SHA512
c5b305380a3ad2f923d656b3bbe68227be9ba92d55abd665e7b44f2e35380a6967f9d2cb6a5a90e1dec6b300896510adb8c160652cc29f059966d08ad89f2782
-
SSDEEP
384:YeD8ZSH2LLZUYyGZbsOiTrowSN9rnZMINlphQ/HYtuiCXdTmdtJgGlzDpH7uNj1n:YeD8ZSWvZHZbs1row697qohQvg9GitJ8
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for modification /dev/misc/watchdog c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for modification /bin/watchdog c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf -
description ioc Process File opened for reading /proc/705/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/766/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/780/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/663/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/672/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/679/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/699/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/707/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/773/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/666/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/671/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/693/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/694/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/710/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/755/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/762/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/774/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/428/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/698/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf File opened for reading /proc/700/cmdline c02c87dfe25f0bb6160d1a59de44d56fd336caff5fbf7216203c54f4991a38c4.elf