Analysis

  • max time kernel
    150s
  • max time network
    8s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    20-01-2025 05:03

General

  • Target

    f3a0987e3358c9f6945c66249f6fa003d78ee4912296c1da598ff17ff2e773f1.elf

  • Size

    32KB

  • MD5

    99f634fcc779931749c366bc58c21de1

  • SHA1

    e026d03b8ba00fcb4d47bc3e7f390882abd0aa9c

  • SHA256

    f3a0987e3358c9f6945c66249f6fa003d78ee4912296c1da598ff17ff2e773f1

  • SHA512

    3fd232d383ae86f53a971b3de7ee16740e105f8b19fc7a3c679d924644dea2d482983c4576ca105ef94b103446436efab67fa1efbb88291feb40531dd8b5efe7

  • SSDEEP

    768:cI8rE/hON9MkI4bOEl5AUxzcZbFRiPA7KFjDv8kLWnG:QgONKktbNl5xl4FRiPAGFjTQG

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 28 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f3a0987e3358c9f6945c66249f6fa003d78ee4912296c1da598ff17ff2e773f1.elf
    /tmp/f3a0987e3358c9f6945c66249f6fa003d78ee4912296c1da598ff17ff2e773f1.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads