Analysis
-
max time kernel
152s -
max time network
155s -
platform
debian-9_mips -
resource
debian9-mipsbe-20231215-en -
resource tags
arch:mipsimage:debian9-mipsbe-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
19-12-2023 23:29
General
-
Target
69c14394c19b7826f59f12b43a8335af
-
Size
31KB
-
MD5
69c14394c19b7826f59f12b43a8335af
-
SHA1
1e0b4169fd8c3527467ca09446802efb92834e17
-
SHA256
5259ff86f2c6200aa64e4584cc6286c64ec289364bf9be39d304f37181a15ad7
-
SHA512
346e796fc2806ea4da887eadf94e5304b382dc46c5634069849b729aaac38a2017a4f8490b9f08198d932f2727bdb8e6eeb362d64b38333d5c487fb3af770c90
-
SSDEEP
768:vsX08KIcQN6jggSIBjhSpnnbYHJgGlzDpUYsy:vM0sh6NzHqYFVqYV
Malware Config
Extracted
Family
mirai
Botnet
UNSTABLE
C2
0x.un5t48l3.host
darksoul.un5t48l3.host
Signatures
-
Contacts a large (79654) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 712 69c14394c19b7826f59f12b43a8335af -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe 69c14394c19b7826f59f12b43a8335af