Analysis

  • max time kernel
    149s
  • max time network
    5s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    30-01-2025 03:49

General

  • Target

    f953642ee3f66def19210969ac7b21cc89a1397bb15a7ded5618a41a5b672559.elf

  • Size

    23KB

  • MD5

    c6a98c2349ea6c265984816454048463

  • SHA1

    0ea150b95c47489b1b345b24f67145d0031ca07f

  • SHA256

    f953642ee3f66def19210969ac7b21cc89a1397bb15a7ded5618a41a5b672559

  • SHA512

    6bccfd2c7f95e3e56e1490559cacfd437b3d5f197d1474ad80a0393eb555177803c8ad44a2f83c88814da8bf07eb3c74ef7ae32c6c03424a7c2b37c783cc4a25

  • SSDEEP

    384:r2eaWjsHPe7rG3HpEsr78p+1J1cIvkW8eg6eq6LFdfv4oMKCZ8JgGlzDpH7uNj1B:qeaKugrGXOw7yAJ1cdWZnwdIbKCeJgGi

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 21 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f953642ee3f66def19210969ac7b21cc89a1397bb15a7ded5618a41a5b672559.elf
    /tmp/f953642ee3f66def19210969ac7b21cc89a1397bb15a7ded5618a41a5b672559.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:701

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads