Analysis

  • max time kernel
    149s
  • max time network
    7s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    01-02-2025 04:05

General

  • Target

    e83d3bdc2117c26015d54246cb52c99522eaa4941da8d80bce55462fc1e53869.elf

  • Size

    23KB

  • MD5

    9861d287930bcb3662ef079d0cf075f8

  • SHA1

    81b9c88096f77d1af1cc7c8e294c14bc23367142

  • SHA256

    e83d3bdc2117c26015d54246cb52c99522eaa4941da8d80bce55462fc1e53869

  • SHA512

    8763a9746ba10ffa4b8563a20bfa19b336aa35a972ab43d8eecee8f36bf7cedc2c319bc55c91f309c5e17dbcfd45c79b18e83f4519a82c042dd4776f9aba4b56

  • SSDEEP

    384:CQiZrliVVSSFa+0mnUid40xfJvNNHN4vwmA+eGdlSQvw8jGAGJgGlzDpH7uNj1JM:zESFa+0qu0/ftQK+nIl8jGAGJgGlzDph

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 17 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/e83d3bdc2117c26015d54246cb52c99522eaa4941da8d80bce55462fc1e53869.elf
    /tmp/e83d3bdc2117c26015d54246cb52c99522eaa4941da8d80bce55462fc1e53869.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:741

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads