Analysis

  • max time kernel
    0s
  • max time network
    162s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20221111-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20221111-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    06-12-2022 22:05

General

  • Target

    a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399

  • Size

    15KB

  • MD5

    29e93f5700318827e26b42285debe3ea

  • SHA1

    f89babf536368dda2c03aa406159c7b271c9d87d

  • SHA256

    a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399

  • SHA512

    55322b394c02839728394fca9e30654b166a3477fa6b7ccd5464ed06a64080c99c9271f8e18e14da4adc78c661421bb35a5babffb7eae90d2c39052f16035cfb

  • SSDEEP

    384:8s+5F9++9Ef3Lnf29t6tqHrf5bUDbGIFeT0lU3VOL:8s+79++efDM0tFeTMUIL

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399
    /tmp/a4c9bc7e4c200402a227d7167fd1b927214cbccd02c60034ccf852b341b45399
    1⤵
    • Writes file to tmp directory
    PID:324
    • /usr/local/sbin/uname
      uname
      2⤵
        PID:330
      • /usr/local/bin/uname
        uname
        2⤵
          PID:330
        • /usr/sbin/uname
          uname
          2⤵
            PID:330
          • /usr/bin/uname
            uname
            2⤵
              PID:330
            • /sbin/uname
              uname
              2⤵
                PID:330
              • /bin/uname
                uname
                2⤵
                  PID:330

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads