Analysis

  • max time kernel
    149s
  • max time network
    6s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-02-2025 03:15

General

  • Target

    5323c4064ee524cda888b1642e5d9ed95b92f032bdc2fb8639826794af660caf.elf

  • Size

    21KB

  • MD5

    b96db41f7227b0df25c8a5b9e413bd0d

  • SHA1

    0ae39a4e8ec8f051a104b581e296504a6a2eae25

  • SHA256

    5323c4064ee524cda888b1642e5d9ed95b92f032bdc2fb8639826794af660caf

  • SHA512

    1800a779341bbf6a5ff12da600bf8af7976e93ae9c4a16851955b2fbe9d2c6dd92ce682dc4a1148d383bacdd5e43a987f952ac57366384911f416aad1dd7af65

  • SSDEEP

    384:oF4Cm/yE32d2H+5vDsMHKwT+z8Lu9xauYf4V5Jv5lQojca3SwGosGhymdGUop5hc:o6lN295bsqJT+zcuvaub5JRlKaXsGs3E

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 32 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/5323c4064ee524cda888b1642e5d9ed95b92f032bdc2fb8639826794af660caf.elf
    /tmp/5323c4064ee524cda888b1642e5d9ed95b92f032bdc2fb8639826794af660caf.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:646

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads