Resubmissions

09-10-2021 06:22

211009-g4zklafbcj 9

07-10-2021 13:06

211007-qcjvhacdd7 9

07-10-2021 12:37

211007-pthhbscfar 1

03-10-2021 12:52

211003-p32bssfdf5 9

01-10-2021 09:38

211001-lmftdabden 9

30-09-2021 14:37

210930-ry4mgahhf3 9

24-09-2021 10:09

210924-l64dsagef7 1

24-09-2021 08:47

210924-kpzhtsgddq 9

24-09-2021 07:54

210924-jr1y1agcfj 1

23-09-2021 18:15

210923-wv15dsfab9 9

Analysis

  • max time kernel
    27281s
  • max time network
    695s
  • platform
    linux_mips
  • resource
    debian9-mipsbe
  • submitted
    01-10-2021 09:38

General

  • Target

    5377

  • Size

    83KB

  • MD5

    5377e8f2ebdb280216c37a6195da9d6c

  • SHA1

    b54c705193b7963a0d40699a91cdb34fedecbe88

  • SHA256

    020f1fa6072108c79ed6f553f4f8b08e157bf17f9c260a76353300230fed09f0

  • SHA512

    65e5aec56ddde56f245a20f88553d2f76bd7dd8e1940e9d49637d51a868fe73003b8a95fffeb9481110579f6ee4790fc9af1668d435930d4c01b116490908eed

Score
9/10

Malware Config

Signatures

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Modifies hosts file 1 IoCs

    Adds to hosts file used for mapping hosts to IP addresses.

  • Writes DNS configuration 1 TTPs 1 IoCs

    Writes data to DNS resolver config file.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 2 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./5377
    ./5377
    1⤵
      PID:328
    • /bin/sh
      sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
      1⤵
        PID:331
        • /sbin/iptables
          iptables -A INPUT -p tcp --destination-port 23 -j DROP
          2⤵
            PID:332
        • /bin/sh
          sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
          1⤵
            PID:338
            • /sbin/iptables
              iptables -A INPUT -p tcp --destination-port 7547 -j DROP
              2⤵
                PID:341
            • /bin/sh
              sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
              1⤵
                PID:342
                • /sbin/iptables
                  iptables -A INPUT -p tcp --destination-port 5555 -j DROP
                  2⤵
                    PID:343
                • /bin/sh
                  sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
                  1⤵
                    PID:344
                    • /sbin/iptables
                      iptables -A INPUT -p tcp --destination-port 5358 -j DROP
                      2⤵
                        PID:345
                    • /bin/sh
                      sh -c "iptables -D INPUT -j CWMP_CR"
                      1⤵
                        PID:346
                        • /sbin/iptables
                          iptables -D INPUT -j CWMP_CR
                          2⤵
                            PID:347
                        • /bin/sh
                          sh -c "iptables -X CWMP_CR"
                          1⤵
                            PID:348
                            • /sbin/iptables
                              iptables -X CWMP_CR
                              2⤵
                                PID:349
                            • /bin/sh
                              sh -c "iptables -I INPUT -p udp --dport 61391 -j ACCEPT"
                              1⤵
                                PID:350
                                • /sbin/iptables
                                  iptables -I INPUT -p udp --dport 61391 -j ACCEPT
                                  2⤵
                                    PID:351
                                • ./atk
                                  ./atk
                                  1⤵
                                    PID:456
                                  • /bin/sh
                                    sh -c "iptables -I INPUT -p tcp --dport 3218 -j ACCEPT"
                                    1⤵
                                      PID:457
                                      • /sbin/iptables
                                        iptables -I INPUT -p tcp --dport 3218 -j ACCEPT
                                        2⤵
                                          PID:458
                                      • /bin/sh
                                        sh -c "iptables -I INPUT -p udp --dport 3218 -j ACCEPT"
                                        1⤵
                                          PID:459
                                          • /sbin/iptables
                                            iptables -I INPUT -p udp --dport 3218 -j ACCEPT
                                            2⤵
                                              PID:460

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads