Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    20/12/2023, 06:56

General

  • Target

    8da1ccbb0e903a35f0242d03e224b1df

  • Size

    199KB

  • MD5

    8da1ccbb0e903a35f0242d03e224b1df

  • SHA1

    494d17ec760d215151e09f5da3c4649d44fadbf9

  • SHA256

    680d361f383d1da89411d7648f865214d3636a919991ea29727a1c77aa454b82

  • SHA512

    6ef4dd99d4e06d9fed317ff57cf91940414c3eabf02e504886916d8d41e2ee91f34d4d1d7a1a0cd260cb25e783f9bcec171ab2f7446bb7944e5de6b8430f6740

  • SSDEEP

    3072:ooIR900aTESn9teFTmlaIZrOzDDTlPWDyaejZh:oowVSeFTmbKDDTlPWDyaejZh

Score
9/10

Malware Config

Signatures

  • Contacts a large (68608) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/8da1ccbb0e903a35f0242d03e224b1df
    /tmp/8da1ccbb0e903a35f0242d03e224b1df
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:711

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads