Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20231215-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    19/12/2023, 23:28

General

  • Target

    688a7999256d00e1c6bf0940928bdd0e

  • Size

    181KB

  • MD5

    688a7999256d00e1c6bf0940928bdd0e

  • SHA1

    9955e46e7ee5982cda1dbe0d916b196dd0b76a61

  • SHA256

    d059996821adbca06ee1fee46f0ca66b3a9b5445c12c2ad13d32d35055c60ee9

  • SHA512

    9a0c50d2dada4e118ba41bf80f3060908c629a61c5935d5e1c2f4d746342a950c45b77fe0c82aacccfa418501dd4c8a2e61475a7de8743ddb3cd153f4a706234

  • SSDEEP

    3072:KqF6uJo1yF+6/6afPqRkjCDDTTdWDTSe4CNg:h6EogF1iO8k2DDTTdWDTSe4CNg

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/688a7999256d00e1c6bf0940928bdd0e
    /tmp/688a7999256d00e1c6bf0940928bdd0e
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads