Analysis

  • max time kernel
    153s
  • max time network
    155s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/12/2023, 23:00

General

  • Target

    3c0b2a4838db32db7c1d3a03cc318da7

  • Size

    52KB

  • MD5

    3c0b2a4838db32db7c1d3a03cc318da7

  • SHA1

    6c3d1c890f58dc21966a5d08f7eb99d3cbf4575d

  • SHA256

    1455ca0d9e1cec7d655c4388f5346a9034af60dea1123e3e6e1dbb86ce2ac725

  • SHA512

    e917b3d5f965e3564752a73dced36bdda6b6ee7113a54399222ec99791f02551a90510392a1ddc2aa2001499a4d5166654c79e40810b7072d926f738b1ffe3a7

  • SSDEEP

    1536:zXbe89+Kie80sDieYnzWaI59M+6UbbAmW6cd0:zCr0s3Y5U9M6bbAEe0

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (20431) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 55 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/3c0b2a4838db32db7c1d3a03cc318da7
    /tmp/3c0b2a4838db32db7c1d3a03cc318da7
    1⤵
    • Reads runtime system information
    PID:674

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads