Analysis

  • max time kernel
    149s
  • max time network
    7s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    19-01-2025 04:13

General

  • Target

    45.11.229.95-boatnet.mips-2025-01-19T022229.elf

  • Size

    31KB

  • MD5

    1804ad27b494fb674f4f0d83cd20a767

  • SHA1

    d42336d77e6ef88d69b8b22e0e9ef9b53c34b699

  • SHA256

    dd6fd9bd44527766554872898b3eefe68a404893d4e21c00dda14545e415dc8a

  • SHA512

    d838d7bbb53e5a5e6e25f48269357a922126c578b793dd53c18c41c4e7a6a093e304546b95d3ebb472441d3c9ce82b5b0201b7c8af3e3b22ff1b06e2289f9412

  • SSDEEP

    768:3BHAmM1r8iRvylPd2Ww+9r8qG5Wu92uVbaMPA6eJgGlzDpbuR1JB:3I3Kv2oD4Ww28aZ6KVJun

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 23 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/45.11.229.95-boatnet.mips-2025-01-19T022229.elf
    /tmp/45.11.229.95-boatnet.mips-2025-01-19T022229.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    • System Network Configuration Discovery
    PID:738

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads