Analysis
-
max time kernel
122s -
max time network
32s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
26-01-2025 03:12
Behavioral task
behavioral1
Sample
1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf
Resource
debian9-mipsbe-20240611-en
5 signatures
150 seconds
General
-
Target
1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf
-
Size
23KB
-
MD5
2286392807233007429f8bbf1132c145
-
SHA1
3427999d5a575b5fbe7d15f9351784d7d7cc273e
-
SHA256
1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443
-
SHA512
9a40d02c766572a73de02b7bda56df96e46a8f11f78ba13196b66c8c406e9eab527c3a9851cbd720c165aa5ced2d62e06bd44bb413763b25660a9fa6a44a7da1
-
SSDEEP
384:neD8ZSH2LLZUYyGZbsOiTrowSN9rnZMINlphQ/HYtuiwimdzJgGlzDpH7uNj1JAF:neD8ZSWvZHZbs1row697qohQvg9wiizh
Score
10/10
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for modification /dev/misc/watchdog 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for modification /bin/watchdog 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf -
description ioc Process File opened for reading /proc/421/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/661/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/674/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/702/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/768/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/696/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/716/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/731/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/802/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/664/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/700/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/701/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/745/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/776/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/764/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/788/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/673/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/681/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/695/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/706/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf File opened for reading /proc/709/cmdline 1ee68c0f5d023a349094fc4aac6ddd1615171dc19f18441eb2f7e6f5450de443.elf