Analysis
-
max time kernel
150s -
max time network
12s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240418-en -
resource tags
arch:mipselimage:debian12-mipsel-20240418-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
18-01-2025 04:23
Behavioral task
behavioral1
Sample
4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf
Resource
debian12-mipsel-20240418-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf
-
Size
24KB
-
MD5
0c8f988478256717823576916c25704c
-
SHA1
e84545e213fdc5ee64a30cee5f677a477935ce65
-
SHA256
4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e
-
SHA512
f700d7182a0ce21b20fb0d4abcd3b0eaaaf5a1aecfd930d16f50d03bba4b8926d2102ca4fa238493c1cecc3a117da3af0b0cb2e0309e59b8d2277b9ab0bcf2b0
-
SSDEEP
768:c4rQlS07dEv0UXqUhvQE+CXQKMQKCXBp5VZq8Wv4:BQlS07FUXqIYSXQKquZqO
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for modification /dev/misc/watchdog 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for modification /bin/watchdog 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf -
description ioc Process File opened for reading /proc/404/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/730/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/403/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/678/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/731/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/751/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/695/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/710/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/717/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/720/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/436/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/672/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/673/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/692/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf File opened for reading /proc/745/cmdline 4f6c096d10f629735f48a93dd50583efb707e79d7155cb4df53e7f4c75048a8e.elf