Analysis

  • max time kernel
    149s
  • max time network
    7s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    22-01-2025 03:24

General

  • Target

    a298a818620d048e87c02b39905f39d7d2b9d0945a64980b202d931fda5cff78.elf

  • Size

    30KB

  • MD5

    59188394da0c09353ea431a39f0c7c36

  • SHA1

    9eb89f80f4c68370f630bb827f00717c4776098f

  • SHA256

    a298a818620d048e87c02b39905f39d7d2b9d0945a64980b202d931fda5cff78

  • SHA512

    56b14e937cd653a0346740f4ceb02c9c60c049ddd09c5f714b461c85482859c66e6ed2973aa9347f11e539f15381be3c180eacddbb685d16d16d76bb95fae3e2

  • SSDEEP

    768:0QsFoLUQUfRbaYdcHUwahED0gnAN99kJsQOwHn2GrrJgGlzDpbuR1JNl3:q4QfRddwahw0geVhwH2kVJuV3

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 21 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/a298a818620d048e87c02b39905f39d7d2b9d0945a64980b202d931fda5cff78.elf
    /tmp/a298a818620d048e87c02b39905f39d7d2b9d0945a64980b202d931fda5cff78.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:709

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads