Analysis

  • max time kernel
    149s
  • max time network
    14s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08-02-2025 03:51

General

  • Target

    83f48f0188466c6e5cd445e682626abde73f3287dd26d61f4a495075239c3802.elf

  • Size

    21KB

  • MD5

    02e787a1b2adc3e9032c4398de1fbd7b

  • SHA1

    79635e6fcbd6ea3a795f7f0bfd869217bcf3e366

  • SHA256

    83f48f0188466c6e5cd445e682626abde73f3287dd26d61f4a495075239c3802

  • SHA512

    547986d94b0a6772f46dfe834342827e18eb0d35771edab9cbe7adcfc9324fc26393407e69f676d6bc7f8049b82571ebd9d7d6f943cb35f442845e3b5eb12187

  • SSDEEP

    384:vvtIoZxrSniaXs+qx+bwqPXFvFr3lpaxMD/mzJDI3DZx8qclpehymdGUop5ha:vvQn4j+PYzJDI3Mqmss3Uozc

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 33 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/83f48f0188466c6e5cd445e682626abde73f3287dd26d61f4a495075239c3802.elf
    /tmp/83f48f0188466c6e5cd445e682626abde73f3287dd26d61f4a495075239c3802.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Reads runtime system information
    PID:650

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads