Analysis

  • max time kernel
    31125s
  • max time network
    152s
  • platform
    linux_mips
  • resource
    debian9-mipsbe-en-20211208
  • resource tags

    arch:mipsimage:debian9-mipsbe-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    03-12-2022 23:11

General

  • Target

    04b38243326ee1b18edf454a346a9166.elf

  • Size

    71KB

  • MD5

    04b38243326ee1b18edf454a346a9166

  • SHA1

    44d453fd0034f634f000dabd940f6246161acdec

  • SHA256

    329d4ac429b8acdc152bfa5e9d011e848c72893efe1b530c5c7b83f4f6338fb4

  • SHA512

    21655253363cafe1da634c35d98c5b30d00aca50ac83e88abd216de75fcdb56ef9db7754fbceb7efb51669b1ec62e88eb42da78e2cf0c20ceabaf58fa79d0dac

  • SSDEEP

    1536:i0y4avHPPTn/m9cf2j/ScoTpxr+0jRb+10WAc:ih3reScoTjr+oReb

Score
9/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 1 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/04b38243326ee1b18edf454a346a9166.elf
    /tmp/04b38243326ee1b18edf454a346a9166.elf
    1⤵
      PID:320

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Hijack Execution Flow

    1
    T1574

    Privilege Escalation

    Hijack Execution Flow

    1
    T1574

    Defense Evasion

    Impair Defenses

    1
    T1562

    Hijack Execution Flow

    1
    T1574

    Discovery

    Network Service Scanning

    1
    T1046

    Replay Monitor

    Loading Replay Monitor...

    Downloads