Analysis
-
max time kernel
150s -
max time network
9s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
25-01-2025 02:05
Behavioral task
behavioral1
Sample
093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf
Resource
debian12-mipsel-20240221-en
5 signatures
150 seconds
General
-
Target
093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf
-
Size
32KB
-
MD5
4bcf0c5a860d11b2d3603c81f5e3197a
-
SHA1
c4874f566ce27bc51bf4ca5d02e76974c78d0e4a
-
SHA256
093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842
-
SHA512
b5a32656abfafe10e496c40e20e553bf1135088069965c7b275f510077955de8547213b953953774e9f56e3be097a48a339bb59df9db63b550e6215262fa5997
-
SSDEEP
768:Jkv6/rdegilpQrmxUV5mHlq17Mq05M/LGgIXemEBWzTWnb:9degilpQrmiVQlq1QAzG9XeFBWzIb
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for modification /dev/watchdog 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for modification /bin/watchdog 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf -
description ioc Process File opened for reading /proc/696/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/721/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/680/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/681/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/718/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/441/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/669/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/698/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/734/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/733/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/748/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/755/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/667/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf File opened for reading /proc/711/cmdline 093e666a0a89cffd8348a09338e4064047dcfb13f3f87ce617db8fcea9ded842.elf