Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    20/12/2023, 01:19

General

  • Target

    785f45caced3bec6984cb2135f680680

  • Size

    102KB

  • MD5

    785f45caced3bec6984cb2135f680680

  • SHA1

    e7d59ea7ea0af74e304b4510e24056f2c52a5343

  • SHA256

    a2caa0d49db0a6aa64d6a168a6cbab95015bf55723366019e2e3b1b5b15c3273

  • SHA512

    fa5b1926c802047a68b03644227fbaadbc5b20276ad889c385dc531fe758d7b44c0186a60faeb6cc8638cfd23b655dcc0737ca8cb269af2bc30c307ee70fd9ec

  • SSDEEP

    1536:IOeTgl3NRA1YIZaxcsIz0vwlEL1BI+pie5ECimW+4FBSrrHyai:IJPucQwleI+Ae5NimW+4FBSnHyai

Score
6/10

Malware Config

Signatures

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/785f45caced3bec6984cb2135f680680
    /tmp/785f45caced3bec6984cb2135f680680
    1⤵
    • Reads system routing table
    • Reads system network configuration
    PID:710

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads