Analysis
-
max time kernel
149s -
max time network
153s -
platform
linux_mipsel -
resource
debian9-mipsel-en-20211208 -
resource tags
arch:mipselimage:debian9-mipsel-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
15-05-2023 01:37
General
-
Target
d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf
-
Size
34KB
-
MD5
98cf4da6c211b5bfe3611564d11c0cac
-
SHA1
6266d294924c49e8c8eb835c5041833a68c14001
-
SHA256
d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38
-
SHA512
07b6060abb199f928f00ea1a2e5ea6d7d6aa6b7987fa8d92e73e3c3ef937915a43f63ab3ad5939125002f7a479d541003f30ca606b3b2569cd86785a700b2dce
-
SSDEEP
768:Qjit3osnfUPVMmz9kOnjBGafdQm2SEWVaY++6QWx:L3s2WkOndGMQmwWVaY++6r
Malware Config
Signatures
-
Contacts a large (66202) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
Processes:
d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself /bin/busybox 335 d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 3 IoCs
Reads data from /proc virtual filesystem.
Processes:
mkdirmvdescription ioc process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/346/exe -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
shdescription ioc process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf/tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf1⤵
- Changes its process name
-
shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf bin/busybox; chmod 777 bin/busybox"2⤵
- Writes file to tmp directory
-
rmrm -rf bin/busybox3⤵
-
mkdirmkdir bin3⤵
- Reads runtime system information
-
mvmv /tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf bin/busybox3⤵
- Reads runtime system information
-
chmodchmod 777 bin/busybox3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/335-1-0x00400000-0x00456dc0-memory.dmp