Analysis

  • max time kernel
    0s
  • max time network
    144s
  • platform
    linux_mips
  • resource
    debian9-mipsbe-en-20211208
  • resource tags

    arch:mipsimage:debian9-mipsbe-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    06-12-2022 22:05

General

  • Target

    a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399

  • Size

    15KB

  • MD5

    29e93f5700318827e26b42285debe3ea

  • SHA1

    f89babf536368dda2c03aa406159c7b271c9d87d

  • SHA256

    a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399

  • SHA512

    55322b394c02839728394fca9e30654b166a3477fa6b7ccd5464ed06a64080c99c9271f8e18e14da4adc78c661421bb35a5babffb7eae90d2c39052f16035cfb

  • SSDEEP

    384:8s+5F9++9Ef3Lnf29t6tqHrf5bUDbGIFeT0lU3VOL:8s+79++efDM0tFeTMUIL

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399
    /tmp/a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399
    1⤵
    • Writes file to tmp directory
    PID:325
    • /usr/local/sbin/uname
      uname
      2⤵
        PID:329
      • /usr/local/bin/uname
        uname
        2⤵
          PID:329
        • /usr/sbin/uname
          uname
          2⤵
            PID:329
          • /usr/bin/uname
            uname
            2⤵
              PID:329
            • /sbin/uname
              uname
              2⤵
                PID:329
              • /bin/uname
                uname
                2⤵
                  PID:329

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads