Analysis

  • max time kernel
    5444s
  • max time network
    140s
  • platform
    linux_mipsel
  • resource
    debian9-mipsel-en-20211208
  • submitted
    09-02-2022 17:33

General

  • Target

    sample

  • Size

    83KB

  • MD5

    b8ed2cb3e9fedec5b164ce84ad5a08d0

  • SHA1

    b45ef9ad0a29b0a402d1613b10c3f6e95686230c

  • SHA256

    d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a

  • SHA512

    98aa6abf6bc6b27ea2833122c468e436c267ef40c5ecbbd6446174d0859920e7b7bbcec617e12d7aa9e89e0492e5dcf4cf49a6208e7252fd0619047818454a31

Score
9/10

Malware Config

Signatures

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Modifies hosts file 1 IoCs

    Adds to hosts file used for mapping hosts to IP addresses.

  • Writes DNS configuration 1 TTPs 1 IoCs

    Writes data to DNS resolver config file.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 2 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • ./sample
    ./sample
    1⤵
    • Reads system routing table
    • Reads system network configuration
    PID:327
  • /bin/sh
    sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
    1⤵
      PID:330
      • /sbin/iptables
        iptables -A INPUT -p tcp --destination-port 23 -j DROP
        2⤵
          PID:331
      • /bin/sh
        sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
        1⤵
          PID:340
          • /sbin/iptables
            iptables -A INPUT -p tcp --destination-port 7547 -j DROP
            2⤵
              PID:341
          • /bin/sh
            sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
            1⤵
              PID:342
              • /sbin/iptables
                iptables -A INPUT -p tcp --destination-port 5555 -j DROP
                2⤵
                  PID:343
              • /bin/sh
                sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
                1⤵
                  PID:344
                  • /sbin/iptables
                    iptables -A INPUT -p tcp --destination-port 5358 -j DROP
                    2⤵
                      PID:345
                  • /bin/sh
                    sh -c "iptables -D INPUT -j CWMP_CR"
                    1⤵
                      PID:346
                      • /sbin/iptables
                        iptables -D INPUT -j CWMP_CR
                        2⤵
                          PID:347
                      • /bin/sh
                        sh -c "iptables -X CWMP_CR"
                        1⤵
                          PID:348
                          • /sbin/iptables
                            iptables -X CWMP_CR
                            2⤵
                              PID:349
                          • /bin/sh
                            sh -c "iptables -I INPUT -p udp --dport 37714 -j ACCEPT"
                            1⤵
                              PID:350
                              • /sbin/iptables
                                iptables -I INPUT -p udp --dport 37714 -j ACCEPT
                                2⤵
                                  PID:351

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads