Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20231215-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    19/12/2023, 22:29

General

  • Target

    0d806caa68fd5a9a459c23ab8646870f

  • Size

    61KB

  • MD5

    0d806caa68fd5a9a459c23ab8646870f

  • SHA1

    4fec904af52ee92203ad2072d6f65f38de1fef6d

  • SHA256

    9ed08e8012d0d4b10bb40b52bafc802bd25fdcb9067e62ef86946923ece670ce

  • SHA512

    e4182e87b9d2f16fb8b4de8ea23406bba49956d51054486201d5a365f575060667273580778a97a40ef90ddae526c57e8ccb6e4d4566c2d7e96beba6db51da5f

  • SSDEEP

    1536:cuEIRnlJsSJFv3y7xrsSPgUCsYuUo1qvAgbiq3utLCLqg:clGn48y7xrsSPgUCsYXfiq3uteh

Score
9/10

Malware Config

Signatures

  • Contacts a large (23034) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/0d806caa68fd5a9a459c23ab8646870f
    /tmp/0d806caa68fd5a9a459c23ab8646870f
    1⤵
    • Changes its process name
    • Enumerates active TCP sockets
    • Reads system network configuration
    PID:706

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads