Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221125-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221125-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    30-06-2023 12:07

General

  • Target

    .i

  • Size

    78KB

  • MD5

    9b6c3518a91d23ed77504b5416bfb5b3

  • SHA1

    0a2d170abbf5031566377b01431e3b82d342630a

  • SHA256

    a04ac6d98ad989312783d4fe3456c53730b212c79a426fb215708b6c6daa3de3

  • SHA512

    b2b08d5d5e6c6708d88b793e9340a780d47b5dce61e0a3026b4cdea8a9e4cbf9824037255e4ea4a40fee5bce956485232376d4677ce72ccb6c7f00badd09956e

  • SSDEEP

    1536:87vbq1lGAXSEYQjbChaAU2yU23M51DjZgSQAvcYkFtZTjzBht5:8D+CAXFYQChaAUk5ljnQssL

Score
8/10

Malware Config

Signatures

  • Contacts a large (904) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 2 IoCs
  • Deletes itself 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 3 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/.i
    /tmp/.i
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Reads system network configuration
    PID:368
  • /bin/sh
    /bin/sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
    1⤵
    • Changes its process name
    • Deletes itself
    PID:371
    • /sbin/iptables
      iptables -A INPUT -p tcp --destination-port 23 -j DROP
      2⤵
        PID:375
    • /bin/sh
      /bin/sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
      1⤵
        PID:381
        • /sbin/iptables
          iptables -A INPUT -p tcp --destination-port 7547 -j DROP
          2⤵
            PID:382
        • /bin/sh
          /bin/sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
          1⤵
            PID:383
            • /sbin/iptables
              iptables -A INPUT -p tcp --destination-port 5555 -j DROP
              2⤵
                PID:384
            • /bin/sh
              /bin/sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
              1⤵
                PID:385
                • /sbin/iptables
                  iptables -A INPUT -p tcp --destination-port 5358 -j DROP
                  2⤵
                    PID:386
                • /bin/sh
                  /bin/sh -c "iptables -D INPUT -j CWMP_CR"
                  1⤵
                    PID:387
                    • /sbin/iptables
                      iptables -D INPUT -j CWMP_CR
                      2⤵
                        PID:388
                    • /bin/sh
                      /bin/sh -c "iptables -X CWMP_CR"
                      1⤵
                        PID:389
                        • /sbin/iptables
                          iptables -X CWMP_CR
                          2⤵
                            PID:390
                        • /bin/sh
                          /bin/sh -c "iptables -I INPUT -p udp --dport 63633 -j ACCEPT"
                          1⤵
                            PID:391
                            • /sbin/iptables
                              iptables -I INPUT -p udp --dport 63633 -j ACCEPT
                              2⤵
                                PID:392
                            • /tmp/atk
                              ./atk
                              1⤵
                                PID:523
                                • /bin/sh
                                  /bin/sh -c "iptables -I INPUT -p tcp --dport 12606 -j ACCEPT"
                                  2⤵
                                  • Changes its process name
                                  • Deletes itself
                                  • Executes dropped EXE
                                  PID:524
                                  • /sbin/iptables
                                    iptables -I INPUT -p tcp --dport 12606 -j ACCEPT
                                    3⤵
                                      PID:525
                                  • /bin/sh
                                    /bin/sh -c "iptables -I INPUT -p udp --dport 12606 -j ACCEPT"
                                    2⤵
                                      PID:526
                                      • /sbin/iptables
                                        iptables -I INPUT -p udp --dport 12606 -j ACCEPT
                                        3⤵
                                          PID:527

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • /tmp/atk

                                      Filesize

                                      53KB

                                      MD5

                                      fc65dc3f6706f09b0568d86ee83b0e6b

                                      SHA1

                                      3285cbc991ab5964817df8e4773d6774bb889bd4

                                      SHA256

                                      48aa1cdc3c454e2c12248405a49e24f74630caeaa9a11148b99f6f0a50dbcfea

                                      SHA512

                                      bb6ddc18ac0d085332bbbc214e729153cf7c2fdf89c0fe1b8dfe1a8b4623f14b2ecaf7eb61cc3f42c76aadd2f726526d165a726fdc1cee5a6bed3fd2117450dc

                                    • memory/368-1-0x00010000-0x000506fc-memory.dmp

                                    • memory/523-2-0x00010000-0x00046a30-memory.dmp