Resubmissions

31-07-2023 03:09

230731-dnyftacd48 9

31-07-2023 03:07

230731-dmqdtacd46 7

31-07-2023 03:07

230731-dmaclacd45 1

Analysis

  • max time kernel
    300s
  • max time network
    297s
  • platform
    linux_mipsel
  • resource
    debian9-mipsel-en-20211208
  • resource tags

    arch:mipselimage:debian9-mipsel-en-20211208kernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    31-07-2023 03:09

General

  • Target

    Untitled.i

  • Size

    83KB

  • MD5

    b8ed2cb3e9fedec5b164ce84ad5a08d0

  • SHA1

    b45ef9ad0a29b0a402d1613b10c3f6e95686230c

  • SHA256

    d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a

  • SHA512

    98aa6abf6bc6b27ea2833122c468e436c267ef40c5ecbbd6446174d0859920e7b7bbcec617e12d7aa9e89e0492e5dcf4cf49a6208e7252fd0619047818454a31

  • SSDEEP

    1536:m3LqE6rUQWzVQR7iAGEcUT5PIi7pLqBNs4LOjcwf4nB6XuzGNy+iSc7tNUZM:mOE6PWo1T5bz4LVMXuzVNScWM

Score
9/10

Malware Config

Signatures

  • Contacts a large (15329) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 3 IoCs
  • Deletes itself 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies Watchdog functionality 1 TTPs 4 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 2 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 4 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 6 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/Untitled.i
    /tmp/Untitled.i
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Reads system network configuration
    PID:332
  • /bin/sh
    sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
    1⤵
    • Changes its process name
    • Deletes itself
    PID:334
    • /sbin/iptables
      iptables -A INPUT -p tcp --destination-port 23 -j DROP
      2⤵
        PID:335
    • /bin/sh
      sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
      1⤵
        PID:344
        • /sbin/iptables
          iptables -A INPUT -p tcp --destination-port 7547 -j DROP
          2⤵
            PID:345
        • /bin/sh
          sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
          1⤵
            PID:346
            • /sbin/iptables
              iptables -A INPUT -p tcp --destination-port 5555 -j DROP
              2⤵
                PID:347
            • /bin/sh
              sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
              1⤵
                PID:348
                • /sbin/iptables
                  iptables -A INPUT -p tcp --destination-port 5358 -j DROP
                  2⤵
                    PID:349
                • /bin/sh
                  sh -c "iptables -D INPUT -j CWMP_CR"
                  1⤵
                    PID:350
                    • /sbin/iptables
                      iptables -D INPUT -j CWMP_CR
                      2⤵
                        PID:351
                    • /bin/sh
                      sh -c "iptables -X CWMP_CR"
                      1⤵
                        PID:352
                        • /sbin/iptables
                          iptables -X CWMP_CR
                          2⤵
                            PID:353
                        • /bin/sh
                          sh -c "iptables -I INPUT -p udp --dport 37714 -j ACCEPT"
                          1⤵
                            PID:354
                            • /sbin/iptables
                              iptables -I INPUT -p udp --dport 37714 -j ACCEPT
                              2⤵
                                PID:355
                            • /tmp/atk
                              ./atk
                              1⤵
                                PID:430
                                • /bin/sh
                                  sh -c "iptables -I INPUT -p tcp --dport 37632 -j ACCEPT"
                                  2⤵
                                  • Changes its process name
                                  • Deletes itself
                                  • Executes dropped EXE
                                  PID:431
                                  • /sbin/iptables
                                    iptables -I INPUT -p tcp --dport 37632 -j ACCEPT
                                    3⤵
                                      PID:432
                                  • /bin/sh
                                    sh -c "iptables -I INPUT -p udp --dport 37632 -j ACCEPT"
                                    2⤵
                                      PID:435
                                      • /sbin/iptables
                                        iptables -I INPUT -p udp --dport 37632 -j ACCEPT
                                        3⤵
                                          PID:436
                                    • /tmp/.i
                                      ./.i
                                      1⤵
                                      • Modifies Watchdog functionality
                                      • Reads system routing table
                                      • Reads system network configuration
                                      PID:466
                                    • /bin/sh
                                      sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
                                      1⤵
                                      • Executes dropped EXE
                                      PID:468
                                      • /sbin/iptables
                                        iptables -A INPUT -p tcp --destination-port 23 -j DROP
                                        2⤵
                                        • Changes its process name
                                        • Deletes itself
                                        PID:469
                                    • /bin/sh
                                      sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
                                      1⤵
                                        PID:470
                                        • /sbin/iptables
                                          iptables -A INPUT -p tcp --destination-port 7547 -j DROP
                                          2⤵
                                            PID:471
                                        • /bin/sh
                                          sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
                                          1⤵
                                            PID:472
                                            • /sbin/iptables
                                              iptables -A INPUT -p tcp --destination-port 5555 -j DROP
                                              2⤵
                                                PID:473
                                            • /bin/sh
                                              sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
                                              1⤵
                                                PID:474
                                                • /sbin/iptables
                                                  iptables -A INPUT -p tcp --destination-port 5358 -j DROP
                                                  2⤵
                                                    PID:475
                                                • /bin/sh
                                                  sh -c "iptables -D INPUT -j CWMP_CR"
                                                  1⤵
                                                    PID:476
                                                    • /sbin/iptables
                                                      iptables -D INPUT -j CWMP_CR
                                                      2⤵
                                                        PID:477
                                                    • /bin/sh
                                                      sh -c "iptables -X CWMP_CR"
                                                      1⤵
                                                        PID:478
                                                        • /sbin/iptables
                                                          iptables -X CWMP_CR
                                                          2⤵
                                                            PID:479
                                                        • /bin/sh
                                                          sh -c "iptables -I INPUT -p udp --dport 37714 -j ACCEPT"
                                                          1⤵
                                                            PID:480
                                                            • /sbin/iptables
                                                              iptables -I INPUT -p udp --dport 37714 -j ACCEPT
                                                              2⤵
                                                                PID:481

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • /tmp/.i

                                                              Filesize

                                                              83KB

                                                              MD5

                                                              b8ed2cb3e9fedec5b164ce84ad5a08d0

                                                              SHA1

                                                              b45ef9ad0a29b0a402d1613b10c3f6e95686230c

                                                              SHA256

                                                              d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a

                                                              SHA512

                                                              98aa6abf6bc6b27ea2833122c468e436c267ef40c5ecbbd6446174d0859920e7b7bbcec617e12d7aa9e89e0492e5dcf4cf49a6208e7252fd0619047818454a31

                                                            • /tmp/.p/.d

                                                              Filesize

                                                              596B

                                                              MD5

                                                              6107001cc26d4fd4f7690fc98cd1c638

                                                              SHA1

                                                              7e329ad74736ce7c91f0dae6a77869de0ab8669f

                                                              SHA256

                                                              71de04a046b0480a6d4cbd3efce153382031510c691ceb7443d515f719516a01

                                                              SHA512

                                                              ce01c064145cb88023c88a54b65936bb61bbff9f589f3f2a3aa7cee48fc7c8e7dff3c5e65218ee005c436a70fb326ccf1d283e9f77f2f5db0b79330948e820b9

                                                            • /tmp/atk

                                                              Filesize

                                                              47KB

                                                              MD5

                                                              4b5a3d4ff5e6722d35a4d86200eb46a2

                                                              SHA1

                                                              b157df100f52ccdf5413ca25fff91a97596aa3d6

                                                              SHA256

                                                              e0bc7ca2ad04110fd5b76d0a55565f7356ed0d669d5988896073cc0e58b6b944

                                                              SHA512

                                                              53fa0a5a6710c4acef19f930e68a50b026a5259d22c89804b387bfc432e63a73091069b9b8e5dc40ef5c7940e04f667d7cc6a4c585cdf1c096745614ee2c3770

                                                            • memory/332-1-0x00400000-0x0047a5a0-memory.dmp

                                                            • memory/430-2-0x00400000-0x00466fe0-memory.dmp

                                                            • memory/466-3-0x00400000-0x0047a5a0-memory.dmp