Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20231215-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    20/12/2023, 07:04

General

  • Target

    8de7107f469a1314cc689499352acbe0

  • Size

    167KB

  • MD5

    8de7107f469a1314cc689499352acbe0

  • SHA1

    167eb51dcb5b09f8c7292fbf21f99069dd1cf708

  • SHA256

    b880f667acbabd52bb464c7de70732ad94cfefbd527bc4e9ef56b953a7485536

  • SHA512

    33f6a40a060b850392c7bc361b0deaa14fc82b8507b4d6578020a7059874783d306f2f8a9aa9606c30a586a3ce60d38d7cc861e473cf3e5304828b01694f6552

  • SSDEEP

    3072:8Wg+6CEOybfjO574JZ/jhacaQTt6EmU8hTaA8TYKpNU:2BOk1NToEmU8hTaA8TYKpNU

Score
9/10

Malware Config

Signatures

  • Contacts a large (23032) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 2 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 23 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/8de7107f469a1314cc689499352acbe0
    /tmp/8de7107f469a1314cc689499352acbe0
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads