Analysis

  • max time kernel
    14156s
  • max time network
    153s
  • platform
    linux_mips
  • resource
    debian9-mipsbe-en-20211208
  • submitted
    21-05-2022 12:56

General

  • Target

    5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023

  • Size

    31KB

  • MD5

    25e2f3770de67a52720c041f37defeca

  • SHA1

    952320907552081a5887570c155e9067770d4aed

  • SHA256

    5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023

  • SHA512

    147fd08c61543694a9aa4344f6fa179922ec318dda746abe045a9862f63fa71d1479fe58dcf7ee2fd9fbcef4bafeda5f66d2803de9d7e7abcaed5d941377c893

Score
9/10

Malware Config

Signatures

  • Contacts a large (100185) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • ./5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023
    ./5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023
    1⤵
    • Reads runtime system information
    PID:320

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Replay Monitor

Loading Replay Monitor...

Downloads