Analysis
-
max time kernel
150s -
max time network
11s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240729-en -
resource tags
arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
23-01-2025 03:58
Behavioral task
behavioral1
Sample
9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf
Resource
debian12-mipsel-20240729-en
5 signatures
150 seconds
General
-
Target
9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf
-
Size
24KB
-
MD5
a69124f33ec42b66057f21630f9c4027
-
SHA1
dbba02abb6cdcfa68be166eb71aebe2187fb7a11
-
SHA256
9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4
-
SHA512
75ed43ff8738e27cf24aebca9861ef43ff6061759315cff39c375e0916f68a21a7237ebc986992fae690880cb87fda4c0645ab11a5debbd1244fe50ae9e271c3
-
SSDEEP
768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBpOZqSWvl:4QlS07FUXqIYSXQKquCqN
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for modification /dev/misc/watchdog 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for modification /bin/watchdog 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf -
description ioc Process File opened for reading /proc/712/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/694/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/412/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/671/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/672/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/719/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/660/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/699/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/723/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/738/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/739/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/751/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/760/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf File opened for reading /proc/692/cmdline 9f087e4dd1de1ad46cb4272004801ae0d3f499dd3fc0bdba8c7f45cc27aa09d4.elf