Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20221125-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20221125-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    30-06-2023 11:51

General

  • Target

    Mozi.m

  • Size

    106KB

  • MD5

    4dde761681684d7edad4e5e1ffdb940b

  • SHA1

    2327be693bc11a618c380d7d3abc2382d870d48b

  • SHA256

    d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8

  • SHA512

    91a61c719128f263f9f95736d55895954cc468c74ff469ee061d35ec382c50b9165e9a5427dc46a835dac6ae0e6e1f9819632475f68b98a907b53196bd4eb02a

  • SSDEEP

    1536:3aQiZDMyqIlMBZ/R0F4E4kcHiNq98wk9njKZjjLuYo68864sNHFEzv7Ld76divkE:KzDMyqIMBZ/R0ufhBmgZy9yNsNmPtcE

Malware Config

Signatures

  • Contacts a large (7955) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Modifies init.d 1 TTPs 2 IoCs

    Adds/modifies system service, likely for persistence.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/Mozi.m
    /tmp/Mozi.m
    1⤵
      PID:326
    • /bin/sh
      sh -c "iptables -I INPUT -p tcp --destination-port 22 -j DROP"
      1⤵
        PID:334
        • /sbin/iptables
          iptables -I INPUT -p tcp --destination-port 22 -j DROP
          2⤵
          • Changes its process name
          PID:335
      • /bin/sh
        sh -c "iptables -I INPUT -p tcp --destination-port 23 -j DROP"
        1⤵
          PID:343
          • /sbin/iptables
            iptables -I INPUT -p tcp --destination-port 23 -j DROP
            2⤵
              PID:344
          • /bin/sh
            sh -c "iptables -I INPUT -p tcp --destination-port 2323 -j DROP"
            1⤵
              PID:345
              • /sbin/iptables
                iptables -I INPUT -p tcp --destination-port 2323 -j DROP
                2⤵
                  PID:346
              • /bin/sh
                sh -c "iptables -I OUTPUT -p tcp --source-port 22 -j DROP"
                1⤵
                  PID:347
                  • /sbin/iptables
                    iptables -I OUTPUT -p tcp --source-port 22 -j DROP
                    2⤵
                      PID:348
                  • /bin/sh
                    sh -c "iptables -I OUTPUT -p tcp --source-port 23 -j DROP"
                    1⤵
                      PID:349
                      • /sbin/iptables
                        iptables -I OUTPUT -p tcp --source-port 23 -j DROP
                        2⤵
                          PID:350
                      • /bin/sh
                        sh -c "iptables -I OUTPUT -p tcp --source-port 2323 -j DROP"
                        1⤵
                          PID:351
                          • /sbin/iptables
                            iptables -I OUTPUT -p tcp --source-port 2323 -j DROP
                            2⤵
                              PID:352
                          • /bin/sh
                            sh -c "iptables -I INPUT -p tcp --destination-port 58000 -j DROP"
                            1⤵
                              PID:353
                              • /sbin/iptables
                                iptables -I INPUT -p tcp --destination-port 58000 -j DROP
                                2⤵
                                  PID:354
                              • /bin/sh
                                sh -c "iptables -I OUTPUT -p tcp --source-port 58000 -j DROP"
                                1⤵
                                  PID:355
                                  • /sbin/iptables
                                    iptables -I OUTPUT -p tcp --source-port 58000 -j DROP
                                    2⤵
                                      PID:356
                                  • /bin/sh
                                    sh -c "cfgtool set /mnt/jffs2/hw_ctree.xml InternetGatewayDevice.ManagementServer URL \"http://127.0.0.1\""
                                    1⤵
                                      PID:357
                                    • /bin/sh
                                      sh -c "cfgtool set /mnt/jffs2/hw_ctree.xml InternetGatewayDevice.ManagementServer ConnectionRequestPassword \"acsMozi\""
                                      1⤵
                                        PID:358
                                      • /bin/sh
                                        sh -c "iptables -I INPUT -p tcp --destination-port 35000 -j DROP"
                                        1⤵
                                          PID:359
                                          • /sbin/iptables
                                            iptables -I INPUT -p tcp --destination-port 35000 -j DROP
                                            2⤵
                                              PID:360
                                          • /bin/sh
                                            sh -c "iptables -I INPUT -p tcp --destination-port 50023 -j DROP"
                                            1⤵
                                              PID:361
                                              • /sbin/iptables
                                                iptables -I INPUT -p tcp --destination-port 50023 -j DROP
                                                2⤵
                                                  PID:362
                                              • /bin/sh
                                                sh -c "iptables -I OUTPUT -p tcp --source-port 50023 -j DROP"
                                                1⤵
                                                  PID:363
                                                  • /sbin/iptables
                                                    iptables -I OUTPUT -p tcp --source-port 50023 -j DROP
                                                    2⤵
                                                      PID:364
                                                  • /bin/sh
                                                    sh -c "iptables -I OUTPUT -p tcp --source-port 35000 -j DROP"
                                                    1⤵
                                                      PID:365
                                                      • /sbin/iptables
                                                        iptables -I OUTPUT -p tcp --source-port 35000 -j DROP
                                                        2⤵
                                                          PID:366
                                                      • /bin/sh
                                                        sh -c "iptables -I INPUT -p tcp --destination-port 7547 -j DROP"
                                                        1⤵
                                                          PID:367
                                                          • /sbin/iptables
                                                            iptables -I INPUT -p tcp --destination-port 7547 -j DROP
                                                            2⤵
                                                              PID:368
                                                          • /bin/sh
                                                            sh -c "iptables -I OUTPUT -p tcp --source-port 7547 -j DROP"
                                                            1⤵
                                                              PID:369
                                                              • /sbin/iptables
                                                                iptables -I OUTPUT -p tcp --source-port 7547 -j DROP
                                                                2⤵
                                                                  PID:370
                                                              • /bin/sh
                                                                sh -c "iptables -I INPUT -p tcp --destination-port 57959 -j ACCEPT"
                                                                1⤵
                                                                  PID:371
                                                                  • /sbin/iptables
                                                                    iptables -I INPUT -p tcp --destination-port 57959 -j ACCEPT
                                                                    2⤵
                                                                      PID:372
                                                                  • /bin/sh
                                                                    sh -c "iptables -I OUTPUT -p tcp --source-port 57959 -j ACCEPT"
                                                                    1⤵
                                                                      PID:373
                                                                      • /sbin/iptables
                                                                        iptables -I OUTPUT -p tcp --source-port 57959 -j ACCEPT
                                                                        2⤵
                                                                          PID:374
                                                                      • /bin/sh
                                                                        sh -c "iptables -I PREROUTING -t nat -p tcp --destination-port 57959 -j ACCEPT"
                                                                        1⤵
                                                                          PID:375
                                                                          • /sbin/iptables
                                                                            iptables -I PREROUTING -t nat -p tcp --destination-port 57959 -j ACCEPT
                                                                            2⤵
                                                                              PID:376
                                                                          • /bin/sh
                                                                            sh -c "iptables -I POSTROUTING -t nat -p tcp --source-port 57959 -j ACCEPT"
                                                                            1⤵
                                                                              PID:385
                                                                              • /sbin/iptables
                                                                                iptables -I POSTROUTING -t nat -p tcp --source-port 57959 -j ACCEPT
                                                                                2⤵
                                                                                  PID:386
                                                                              • /bin/sh
                                                                                sh -c "iptables -I INPUT -p udp --destination-port 19638 -j ACCEPT"
                                                                                1⤵
                                                                                  PID:387
                                                                                  • /sbin/iptables
                                                                                    iptables -I INPUT -p udp --destination-port 19638 -j ACCEPT
                                                                                    2⤵
                                                                                      PID:388
                                                                                  • /bin/sh
                                                                                    sh -c "iptables -I OUTPUT -p udp --source-port 19638 -j ACCEPT"
                                                                                    1⤵
                                                                                      PID:389
                                                                                      • /sbin/iptables
                                                                                        iptables -I OUTPUT -p udp --source-port 19638 -j ACCEPT
                                                                                        2⤵
                                                                                          PID:390
                                                                                      • /bin/sh
                                                                                        sh -c "iptables -I PREROUTING -t nat -p udp --destination-port 19638 -j ACCEPT"
                                                                                        1⤵
                                                                                          PID:391
                                                                                          • /sbin/iptables
                                                                                            iptables -I PREROUTING -t nat -p udp --destination-port 19638 -j ACCEPT
                                                                                            2⤵
                                                                                              PID:392
                                                                                          • /bin/sh
                                                                                            sh -c "iptables -I POSTROUTING -t nat -p udp --source-port 19638 -j ACCEPT"
                                                                                            1⤵
                                                                                              PID:393
                                                                                              • /sbin/iptables
                                                                                                iptables -I POSTROUTING -t nat -p udp --source-port 19638 -j ACCEPT
                                                                                                2⤵
                                                                                                  PID:394

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v6

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • /etc/rcS.d/S95baby.sh

                                                                                                Filesize

                                                                                                25B

                                                                                                MD5

                                                                                                1b3235ba10fc04836c941d3d27301956

                                                                                                SHA1

                                                                                                8909655763143702430b8c58b3ae3b04cfd3a29c

                                                                                                SHA256

                                                                                                01ba1fb41632594997a41d0c3a911ae5b3034d566ebb991ef76ad76e6f9e283a

                                                                                                SHA512

                                                                                                98bdb5c266222ccbd63b6f80c87e501c8033dc53b0513d300b8da50e39a207a0b69f8cd3ecc4a128dec340a1186779fedd1049c9b0a70e90d2cb3ae6ebfa4c4d

                                                                                              • /tmp/config

                                                                                                Filesize

                                                                                                109B

                                                                                                MD5

                                                                                                18a576e4660c72d5d445c3896744f390

                                                                                                SHA1

                                                                                                84eb9170a0350ab5e6bcab6a82c83576be39b821

                                                                                                SHA256

                                                                                                2ae465a253f97dafe16afe0c8086676c2948f95b3d03a62da288ba9c7264353a

                                                                                                SHA512

                                                                                                f4bcf08b3e5f942db835c9457c80a6d79bc66bc593abf8e07721b96a78a31040ac9bc7fe66649778175e8348ba1a35af3dfadabd901313f77c893f34631aa862

                                                                                              • /usr/networks

                                                                                                Filesize

                                                                                                106KB

                                                                                                MD5

                                                                                                4dde761681684d7edad4e5e1ffdb940b

                                                                                                SHA1

                                                                                                2327be693bc11a618c380d7d3abc2382d870d48b

                                                                                                SHA256

                                                                                                d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8

                                                                                                SHA512

                                                                                                91a61c719128f263f9f95736d55895954cc468c74ff469ee061d35ec382c50b9165e9a5427dc46a835dac6ae0e6e1f9819632475f68b98a907b53196bd4eb02a

                                                                                              • memory/326-1-0x00400000-0x0049de24-memory.dmp