Analysis

  • max time kernel
    150s
  • max time network
    36s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    20-01-2025 04:34

General

  • Target

    9c30cd5d24e3c342d8104fe695efc28d7142b6335996430690739749e99a0d19.elf

  • Size

    32KB

  • MD5

    8d6b4cc9d8521a7098ba5cfadea98d67

  • SHA1

    236349ba178e0e7b90fed1cab448d78fac5c1a55

  • SHA256

    9c30cd5d24e3c342d8104fe695efc28d7142b6335996430690739749e99a0d19

  • SHA512

    9cd95ac9b2048ca9c0be27bcb5fc1330ea64d56691acdd645d60566576a17db82b6c8c42228ba9f121be7ba71140e3007e2cdc3275e5ac830a10fd0591491196

  • SSDEEP

    768:tI8rE/hON9MkI4bOEl5AUxzcZbFRiPA7KFjDv8EBWnH:DgONKktbNl5xl4FRiPAGFjYH

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 31 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/9c30cd5d24e3c342d8104fe695efc28d7142b6335996430690739749e99a0d19.elf
    /tmp/9c30cd5d24e3c342d8104fe695efc28d7142b6335996430690739749e99a0d19.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:709

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads