Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    ubuntu-22.04_amd64
  • resource
    ubuntu2204-amd64-20240611-en
  • resource tags

    arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system
  • submitted
    18-02-2025 05:43

General

  • Target

    boatnet.x86.elf

  • Size

    20KB

  • MD5

    96f3a4c996750d9f2254cc55883c2ee4

  • SHA1

    985d2163502ffe96c88c2c578cb9205c6140947a

  • SHA256

    984e3565cdf897a62523a6776c16835634be7312a415d8c36c56ce14545539d7

  • SHA512

    6b29d2fa53cc5a912372da02c52e69fd440494cf84054adaa45d8a2d5600e514e9b0ce5a56f417de7df698de3e52e2b2800561be15b6e6e7da67bd6f5d00a7e1

  • SSDEEP

    384:M0sLpj8s/qPui8uZxoIA57RWQjJiEVi+ZkXaqOKV14b+502F2vwA9dWuMW21bAKL:k98o08kxofBE+ZkXaqGbp2F2TWul0c5q

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 2 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads