Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mips -
resource
debian9-mipsbe-20230831-en -
resource tags
arch:mipsimage:debian9-mipsbe-20230831-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
05/10/2023, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
f44335b7b8b3fe04567de3f894ebd9634439cf30275335212cbe72805cbf58c8elf_JC.elf
Resource
debian9-mipsbe-20230831-en
General
-
Target
f44335b7b8b3fe04567de3f894ebd9634439cf30275335212cbe72805cbf58c8elf_JC.elf
-
Size
110KB
-
MD5
56914892ce20aa1bb1bc105443e1e5c6
-
SHA1
02770ca948619ccaec8b5870ea1e12097562e83c
-
SHA256
f44335b7b8b3fe04567de3f894ebd9634439cf30275335212cbe72805cbf58c8
-
SHA512
bf4c6a3b27b0e2400f46449ed2a7a1ee51deb2da6ea139e5d6bd9b14a2c1dac4e2aaff089536405f143850965c6e9436620b41587a7e963083efd78d211efc41
-
SSDEEP
1536:ZZkalZCevKSJSSSgMSnXKUFrIX3En/E1p6mtQYxWQ+qibro409eOd3Ly9df:Sejn1pIXU/E1NeYCqibro40V3Ly9df
Malware Config
Signatures
-
Contacts a large (10159) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself eo047lmobh 333 f44335b7b8b3fe04567de3f894ebd9634439cf30275335212cbe72805cbf58c8elf_JC.elf -
Deletes itself 1 IoCs
pid Process 333 f44335b7b8b3fe04567de3f894ebd9634439cf30275335212cbe72805cbf58c8elf_JC.elf -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc File opened for reading /proc/net/tcp -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 51 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/347/exe File opened for reading /proc/413/comm File opened for reading /proc/350/comm File opened for reading /proc/401/maps File opened for reading /proc/405/exe File opened for reading /proc/306/maps File opened for reading /proc/328/maps File opened for reading /proc/331/exe File opened for reading /proc/337/exe File opened for reading /proc/337/maps File opened for reading /proc/339/exe File opened for reading /proc/339/comm File opened for reading /proc/346/comm File opened for reading /proc/306/comm File opened for reading /proc/328/comm File opened for reading /proc/329/exe File opened for reading /proc/337/comm File opened for reading /proc/384/comm File opened for reading /proc/417/exe File opened for reading /proc/435/maps File opened for reading /proc/384/maps File opened for reading /proc/384/exe File opened for reading /proc/401/comm File opened for reading /proc/405/maps File opened for reading /proc/307/exe File opened for reading /proc/346/exe File opened for reading /proc/347/comm File opened for reading /proc/350/maps File opened for reading /proc/417/maps File opened for reading /proc/435/comm File opened for reading /proc/350/exe File opened for reading /proc/413/exe File opened for reading /proc/413/maps File opened for reading /proc/435/exe File opened for reading /proc/307/maps File opened for reading /proc/329/comm File opened for reading /proc/339/maps File opened for reading /proc/347/maps File opened for reading /proc/329/maps File opened for reading /proc/331/maps File opened for reading /proc/332/exe File opened for reading /proc/332/comm File opened for reading /proc/332/maps File opened for reading /proc/346/maps File opened for reading /proc/401/exe File opened for reading /proc/306/exe File opened for reading /proc/307/comm File opened for reading /proc/328/exe File opened for reading /proc/331/comm File opened for reading /proc/405/comm File opened for reading /proc/417/comm -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/f44335b7b8b3fe04567de3f894ebd9634439cf30275335212cbe72805cbf58c8elf_JC.elf f44335b7b8b3fe04567de3f894ebd9634439cf30275335212cbe72805cbf58c8elf_JC.elf