Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    linux_mipsel
  • resource
    debian9-mipsel-en-20211208
  • resource tags

    arch:mipselimage:debian9-mipsel-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    15-05-2023 01:37

General

  • Target

    d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf

  • Size

    34KB

  • MD5

    98cf4da6c211b5bfe3611564d11c0cac

  • SHA1

    6266d294924c49e8c8eb835c5041833a68c14001

  • SHA256

    d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38

  • SHA512

    07b6060abb199f928f00ea1a2e5ea6d7d6aa6b7987fa8d92e73e3c3ef937915a43f63ab3ad5939125002f7a479d541003f30ca606b3b2569cd86785a700b2dce

  • SSDEEP

    768:Qjit3osnfUPVMmz9kOnjBGafdQm2SEWVaY++6QWx:L3s2WkOndGMQmwWVaY++6r

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (66202) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 3 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf
    /tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf
    1⤵
    • Changes its process name
    PID:335
    • sh
      sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf bin/busybox; chmod 777 bin/busybox"
      2⤵
      • Writes file to tmp directory
      PID:337
      • rm
        rm -rf bin/busybox
        3⤵
          PID:338
        • mkdir
          mkdir bin
          3⤵
          • Reads runtime system information
          PID:339
        • mv
          mv /tmp/d07280becf607fa4e06dd4ac50d2cb51683e90ee4b3db0abc1c347068fa21b38.elf bin/busybox
          3⤵
          • Reads runtime system information
          PID:340
        • chmod
          chmod 777 bin/busybox
          3⤵
            PID:344

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Network Service Scanning

      2
      T1046

      System Network Connections Discovery

      1
      T1049

      System Network Configuration Discovery

      1
      T1016

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/335-1-0x00400000-0x00456dc0-memory.dmp