Analysis

  • max time kernel
    14s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    20-12-2023 05:19

General

  • Target

    mining

  • Size

    355B

  • MD5

    8674ce902ffedf49ae4be47baabcc2c0

  • SHA1

    441ecd5d3a928125e10a0b6b19f7eed31cfd4476

  • SHA256

    8f93a7dd12dbd84749cb5cf675cd8371bd732655a8d048f269d8e88e8136e2e3

  • SHA512

    8428b05454cc9a6ccc3ddea862d9f38b6f10f542ebf6f784b2f7027a985f1adc9bf7c69d3306b6d4d1896af9ec8e7fe1e1d9291c60652c46d7e5126a2d2e3380

Score
6/10

Malware Config

Signatures

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads CPU attributes 1 TTPs 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 2 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/mining
    /tmp/mining
    1⤵
    • Writes file to tmp directory
    PID:720
    • /tmp/init
      /tmp/init
      2⤵
        PID:728
      • /bin/uname
        uname -m
        2⤵
          PID:729
        • /bin/ps
          ps -ef
          2⤵
          • Reads CPU attributes
          • Reads runtime system information
          PID:730
        • /bin/grep
          grep "sendmail: accepting connections"
          2⤵
            PID:731
          • /bin/grep
            grep -v grep
            2⤵
              PID:732
            • /usr/bin/awk
              awk "{print \$2}"
              2⤵
              • Reads runtime system information
              PID:733
            • /usr/bin/head
              head -1
              2⤵
                PID:734

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads