Analysis

  • max time kernel
    151s
  • max time network
    11s
  • platform
    debian-12_mipsel
  • resource
    debian12-mipsel-20240729-en
  • resource tags

    arch:mipselimage:debian12-mipsel-20240729-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem
  • submitted
    25-01-2025 15:48

General

  • Target

    boatnet.mpsl.elf

  • Size

    24KB

  • MD5

    7f60eb1455dff80437e42c93e7247476

  • SHA1

    167fea94fd667b037aa28068645c7be85b690bab

  • SHA256

    150a3de84d8410a60b2c6367f89e80dc37d4d3fbbafc4bb7c49755703e748de6

  • SHA512

    d76292c00ddb0ffef9a4f6c480342b8d3845736d49f441422d884027f399879698e1c43371cf91f6860c53b67f18668c04b800324d5c3a8bbea46244af8a2df0

  • SSDEEP

    768:obrQlS07dEv0UXqUhvQE+CXQKMQKCXBpJZqSWvT:4QlS07FUXqIYSXQKqufqL

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 14 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/boatnet.mpsl.elf
    /tmp/boatnet.mpsl.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:750

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads