Analysis
-
max time kernel
149s -
max time network
7s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
18-01-2025 03:17
Behavioral task
behavioral1
Sample
3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf
Resource
debian9-mipsbe-20240729-en
debian-9-mips
5 signatures
150 seconds
General
-
Target
3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf
-
Size
27KB
-
MD5
22eb9561e35cbac299cb1ddba8617776
-
SHA1
5905c4c82e3d1091186191e30cb4b8f09b2a21da
-
SHA256
3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d
-
SHA512
b49f8544a612a3b3c07beb7b9067798d191acb7bd1d57458b5653af92b04f5994716b111c8b8122f3702466ada5ea6da005f3aaf3f9442bd9af950eba4d668fd
-
SSDEEP
768:01EC/0xrSerexnr9U8ppa/9G/1ggaTwafN8nJgGlzDpbuR1JD:01Z/0xrHrexr28v8G/1aTwa1GVJu9
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for modification /dev/misc/watchdog 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for modification /bin/watchdog 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf -
description ioc Process File opened for reading /proc/696/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/698/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/764/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/664/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/675/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/692/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/760/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/669/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/697/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/753/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/796/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/691/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/705/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/772/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/713/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/754/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/667/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/674/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf File opened for reading /proc/703/cmdline 3728ca146cddaa181e39a0a0a19f5e56437a6ef50687495ebdd658f62638143d.elf