Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    14/04/2025, 19:44

General

  • Target

    parm7.elf

  • Size

    57KB

  • MD5

    879d94931867f6e9995dbd791a5fbd2c

  • SHA1

    ed92c124ed262c8cdd23dc9b61befdeab0bbe2e5

  • SHA256

    d00cd2fe5bbe371d416c98a4f951bc8143ef701bab17e46a5ede39394dff83f3

  • SHA512

    5d68941edf6eae2ab17d9d8b70c92036dd0429a4d37ef9e804460a2538295d3b00219348112bb8d375a66a5c2529951c0de9886f5706c166334aa668f8d46c1b

  • SSDEEP

    1536:+PS4tGPvZTbcmT6mYK3m8JyxVLCYYH9rJ:+PltGHT6mYGmHLCYo9rJ

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Changes its process name 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/parm7.elf
    /tmp/parm7.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Changes its process name
    • Reads runtime system information
    PID:702

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads