Analysis

  • max time kernel
    0s
  • max time network
    196s
  • platform
    linux_mips
  • resource
    debian9-mipsbe
  • submitted
    27-07-2021 16:05

General

  • Target

    3367825f0fed491f93fcdd8200191b98

  • Size

    37KB

  • MD5

    3367825f0fed491f93fcdd8200191b98

  • SHA1

    26060e5b061f019770352cdc60d3ffdbd8e75a22

  • SHA256

    bb90a8e444c76e8d06148849701535bd57c37c50cc6a96237d660382369d4d1b

  • SHA512

    94031f49b073abf55e6f4183b0803c071c146147d39ea3b35706fa37db9fe88bfa3485c2d4851070d62c8146ae4d382bb1c6600ba7074f7cffbf6a727ca0dfda

Score
9/10

Malware Config

Signatures

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 1 IoCs
  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • ./3367825f0fed491f93fcdd8200191b98
    ./3367825f0fed491f93fcdd8200191b98
    1⤵
    • Reads runtime system information
    PID:343

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Replay Monitor

Loading Replay Monitor...

Downloads