Analysis

  • max time kernel
    6s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    19/12/2023, 23:07

General

  • Target

    46686fe6d6788982a78dcda64439f035

  • Size

    102KB

  • MD5

    46686fe6d6788982a78dcda64439f035

  • SHA1

    0983dae91c88237217adf3c0f4443b1600aefd3b

  • SHA256

    db9ad647a8f3957e5a551f0e0e05a9434b71abeee82f04dc31cb142adce0a87c

  • SHA512

    bfd0d1ee1d64eac2c48afa9b00ab1ea9780fd6746592476557d11561189bcaee47f9f86532774c46ca69b64de793aa1e5de9cf2245a0b6643d7e4478357897cc

  • SSDEEP

    1536:lTYqgK5rDqDXi9mnb5lQV6mAQ9UTt7qB5Z3RC1klx:lhgqrDqDXckliuqB5

Score
6/10

Malware Config

Signatures

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/46686fe6d6788982a78dcda64439f035
    /tmp/46686fe6d6788982a78dcda64439f035
    1⤵
    • Enumerates active TCP sockets
    • Reads system network configuration
    PID:717

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads