Analysis

  • max time kernel
    7238s
  • max time network
    127s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    03-02-2023 12:12

General

  • Target

    a04ac6d98ad989312783d4fe3456c53730b212c79a426fb215708b6c6daa3de3

  • Size

    78KB

  • MD5

    9b6c3518a91d23ed77504b5416bfb5b3

  • SHA1

    0a2d170abbf5031566377b01431e3b82d342630a

  • SHA256

    a04ac6d98ad989312783d4fe3456c53730b212c79a426fb215708b6c6daa3de3

  • SHA512

    b2b08d5d5e6c6708d88b793e9340a780d47b5dce61e0a3026b4cdea8a9e4cbf9824037255e4ea4a40fee5bce956485232376d4677ce72ccb6c7f00badd09956e

  • SSDEEP

    1536:87vbq1lGAXSEYQjbChaAU2yU23M51DjZgSQAvcYkFtZTjzBht5:8D+CAXFYQChaAUk5ljnQssL

Score
9/10

Malware Config

Signatures

  • Modifies the Watchdog daemon 1 TTPs

    Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

  • Modifies hosts file 1 IoCs

    Adds to hosts file used for mapping hosts to IP addresses.

  • Writes DNS configuration 1 TTPs 1 IoCs

    Writes data to DNS resolver config file.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 3 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/a04ac6d98ad989312783d4fe3456c53730b212c79a426fb215708b6c6daa3de3
    /tmp/a04ac6d98ad989312783d4fe3456c53730b212c79a426fb215708b6c6daa3de3
    1⤵
    • Reads system routing table
    • Reads system network configuration
    PID:369
  • /bin/sh
    /bin/sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
    1⤵
      PID:375
      • /sbin/iptables
        iptables -A INPUT -p tcp --destination-port 23 -j DROP
        2⤵
          PID:376
      • /bin/sh
        /bin/sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
        1⤵
          PID:381
          • /sbin/iptables
            iptables -A INPUT -p tcp --destination-port 7547 -j DROP
            2⤵
              PID:382
          • /bin/sh
            /bin/sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
            1⤵
              PID:383
              • /sbin/iptables
                iptables -A INPUT -p tcp --destination-port 5555 -j DROP
                2⤵
                  PID:384
              • /bin/sh
                /bin/sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
                1⤵
                  PID:385
                  • /sbin/iptables
                    iptables -A INPUT -p tcp --destination-port 5358 -j DROP
                    2⤵
                      PID:386
                  • /bin/sh
                    /bin/sh -c "iptables -D INPUT -j CWMP_CR"
                    1⤵
                      PID:387
                      • /sbin/iptables
                        iptables -D INPUT -j CWMP_CR
                        2⤵
                          PID:388
                      • /bin/sh
                        /bin/sh -c "iptables -X CWMP_CR"
                        1⤵
                          PID:389
                          • /sbin/iptables
                            iptables -X CWMP_CR
                            2⤵
                              PID:390
                          • /bin/sh
                            /bin/sh -c "iptables -I INPUT -p udp --dport 25557 -j ACCEPT"
                            1⤵
                              PID:391
                              • /sbin/iptables
                                iptables -I INPUT -p udp --dport 25557 -j ACCEPT
                                2⤵
                                  PID:392

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Defense Evasion

                              Impair Defenses

                              1
                              T1562

                              Discovery

                              System Network Connections Discovery

                              1
                              T1049

                              System Network Configuration Discovery

                              2
                              T1016

                              Command and Control

                              Dynamic Resolution

                              1
                              T1568

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads