Analysis
-
max time kernel
150s -
max time network
10s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240729-en -
resource tags
arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
20-01-2025 02:18
Behavioral task
behavioral1
Sample
402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf
Resource
debian12-mipsel-20240729-en
debian-12-mipsel
5 signatures
150 seconds
General
-
Target
402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf
-
Size
31KB
-
MD5
31fb8b7c3f112d0c2745e23d514247e3
-
SHA1
5be6f0d225331a04523b48afe16c530692cadece
-
SHA256
402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63
-
SHA512
8b2b09438445ba0eb6a8acce2a43ab3e400663277c933362633e6976237fa33a38edc649185c76f4904b58514c92a9b7d3cb8025291cf75303ddf07217426911
-
SSDEEP
768:puUWo51jxp/V7JXyAZvsH48qfyBBbsId+HxW3:tWy1vV7xzZ0H4VfasId+Hc
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for modification /dev/misc/watchdog 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for modification /bin/watchdog 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf -
description ioc Process File opened for reading /proc/677/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/719/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/733/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/681/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/746/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/682/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/722/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/734/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/751/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/412/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/666/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/697/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/699/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf File opened for reading /proc/712/cmdline 402db8d1117a944d4752270a2a2bb1467564aa6bcc215e8c7c87ef50c718ca63.elf