Analysis
-
max time kernel
0s -
max time network
153s -
platform
linux_mips -
resource
debian9-mipsbe-en-20211208 -
resource tags
arch:mipsimage:debian9-mipsbe-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
12-10-2022 16:02
Static task
static1
Behavioral task
behavioral1
Sample
18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf
Resource
debian9-mipsbe-en-20211208
General
-
Target
18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf
-
Size
1MB
-
MD5
ae5592bdb0464f06c88f665282991b82
-
SHA1
be5bf9dfec7fae911666060f584b4ffd0b04185f
-
SHA256
18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02
-
SHA512
4c57878362b342a0928c8ddcb3fccff79be1ee0164e4f16c2d5169d14ea8ce322ac37693f965e8584fa950d733b70fe3d084cce4cf3675d62104482404b870a0
-
SSDEEP
49152:Um7vtBcWDjchCCpjy3WT/N7SExRtmbj2mEE5MBn:U67cWDoggmrExRtmbHEE2Bn
Malware Config
Signatures
-
StealthWorker
StealthWorker is golang-based brute force malware.
-
Attempts to identify hypervisor via CPU configuration ⋅ 1 TTPs 2 IoCs
Checks CPU information for indicators that the system is a virtual machine.
Processes:
catcatdescription ioc process /proc/cpuinfo /proc/cpuinfo cat /proc/cpuinfo /proc/cpuinfo cat -
Modifies hosts file ⋅ 1 IoCs
Adds to hosts file used for mapping hosts to IP addresses.
Processes:
18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elfdescription ioc process /etc/hosts /etc/hosts 18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf -
Writes DNS configuration ⋅ 1 TTPs 1 IoCs
Writes data to DNS resolver config file.
-
Reads runtime system information ⋅ 7 IoCs
Reads data from /proc virtual filesystem.
Processes:
cat18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elfcatcrontab18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elfdescription ioc process /proc/version /proc/version cat /proc/self/exe /proc/self/exe 18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf /proc/sys/net/core/somaxconn /proc/sys/net/core/somaxconn 18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf /proc/version /proc/version cat /proc/filesystems /proc/filesystems crontab /proc/self/exe /proc/self/exe 18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf /proc/sys/net/core/somaxconn /proc/sys/net/core/somaxconn 18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf -
Writes file to tmp directory ⋅ 4 IoCs
Malware often drops required files in the /tmp directory.
Processes:
crontabdescription ioc /tmp/.pid /tmp/.pid /tmp/nip9iNeiph5chee /tmp/nip9iNeiph5chee /tmp/nip9iNeiph5chee /tmp/nip9iNeiph5chee crontab /tmp/[stealth].pid /tmp/[stealth].pid
Processes
-
/tmp/18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf/tmp/18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elfReads runtime system information
-
/bin/catcat /proc/versionReads runtime system information
-
/bin/catcat /proc/cpuinfoAttempts to identify hypervisor via CPU configuration
-
/bin/unameuname -a
-
/usr/bin/getconfgetconf LONG_BIT
-
/tmp/18a4352b2101b4fa81652d5fce34b08ed7def8bd40e413cebf991ede97692a02.elf"[stealth]"Modifies hosts fileReads runtime system information
-
/bin/catcat /proc/versionReads runtime system information
-
/bin/catcat /proc/cpuinfoAttempts to identify hypervisor via CPU configuration
-
/bin/unameuname -a
-
/usr/bin/getconfgetconf LONG_BIT
-
/usr/bin/crontab/usr/bin/crontab /tmp/nip9iNeiph5cheeReads runtime system informationWrites file to tmp directory
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation