Analysis
-
max time kernel
150s -
max time network
152s -
platform
debian-9_armhf -
resource
debian9-armhf-20221111-en -
resource tags
arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-05-2023 16:00
General
-
Target
3128bffe8b7ec9bcfcf2a761fd4958d6.elf
-
Size
48KB
-
MD5
3128bffe8b7ec9bcfcf2a761fd4958d6
-
SHA1
b938e0e0aca26825d991abd489f5bc07f81447b4
-
SHA256
f37156d08947cadc02b422cd99d539f8599dcabce959838cd77aa510060195ff
-
SHA512
11f0c59836cbc22b569bafda7e92276f34185f3ede5fce6eb61d5c8b16b5afb7777da3a4f6e5f50879bf3e661fe4cd3d6d56d3ea9d27e74252349c128502c48c
-
SSDEEP
1536:zzIVF/thIhT9sqavNL9YdyNXV7yixQnHY:zzkb8RsqalL90yNXV+ix64
Malware Config
Extracted
mirai
BOTNET
cnc.kintaro.cc
Signatures
-
Contacts a large (94468) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon 1 TTPs
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Changes its process name 1 IoCs
Processes:
3128bffe8b7ec9bcfcf2a761fd4958d6.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /var/Sofia 367 3128bffe8b7ec9bcfcf2a761fd4958d6.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
3128bffe8b7ec9bcfcf2a761fd4958d6.elfdescription ioc process File opened for reading /proc/net/tcp 3128bffe8b7ec9bcfcf2a761fd4958d6.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
3128bffe8b7ec9bcfcf2a761fd4958d6.elfdescription ioc process File opened for reading /proc/net/tcp 3128bffe8b7ec9bcfcf2a761fd4958d6.elf -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
Processes:
3128bffe8b7ec9bcfcf2a761fd4958d6.elfdescription ioc File opened for reading /proc/96/cmdline File opened for reading /proc/362/cmdline File opened for reading /proc/400/cmdline File opened for reading /proc/5/cmdline File opened for reading /proc/13/cmdline File opened for reading /proc/17/cmdline File opened for reading /proc/20/cmdline File opened for reading /proc/29/cmdline File opened for reading /proc/498/cmdline File opened for reading /proc/15/cmdline File opened for reading /proc/75/cmdline File opened for reading /proc/314/cmdline File opened for reading /proc/379/cmdline File opened for reading /proc/10/cmdline File opened for reading /proc/11/cmdline File opened for reading /proc/105/cmdline File opened for reading /proc/253/cmdline File opened for reading /proc/18/cmdline File opened for reading /proc/26/cmdline File opened for reading /proc/27/cmdline File opened for reading /proc/28/cmdline File opened for reading /proc/108/cmdline File opened for reading /proc/394/cmdline File opened for reading /proc/7/cmdline File opened for reading /proc/41/cmdline File opened for reading /proc/132/cmdline File opened for reading /proc/136/cmdline File opened for reading /proc/386/cmdline File opened for reading /proc/25/cmdline File opened for reading /proc/312/cmdline File opened for reading /proc/497/cmdline File opened for reading /proc/21/cmdline File opened for reading /proc/363/cmdline File opened for reading /proc/374/cmdline File opened for reading /proc/375/cmdline File opened for reading /proc/403/cmdline File opened for reading /proc/287/cmdline File opened for reading /proc/325/cmdline File opened for reading /proc/384/cmdline File opened for reading /proc/self/exe 3128bffe8b7ec9bcfcf2a761fd4958d6.elf File opened for reading /proc/8/cmdline File opened for reading /proc/14/cmdline File opened for reading /proc/238/cmdline File opened for reading /proc/284/cmdline File opened for reading /proc/463/cmdline File opened for reading /proc/478/cmdline File opened for reading /proc/428/cmdline File opened for reading /proc/1/cmdline File opened for reading /proc/22/cmdline File opened for reading /proc/146/cmdline File opened for reading /proc/221/cmdline File opened for reading /proc/398/cmdline File opened for reading /proc/43/cmdline File opened for reading /proc/392/cmdline File opened for reading /proc/396/cmdline File opened for reading /proc/388/cmdline File opened for reading /proc/402/cmdline File opened for reading /proc/12/cmdline File opened for reading /proc/107/cmdline File opened for reading /proc/285/cmdline File opened for reading /proc/356/cmdline File opened for reading /proc/377/cmdline File opened for reading /proc/142/cmdline File opened for reading /proc/366/cmdline
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/367-1-0x00008000-0x000255ec-memory.dmp