Analysis
-
max time kernel
39s -
max time network
41s -
platform
debian-9_armhf -
resource
debian9-armhf-20231215-en -
resource tags
arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
20-12-2023 09:07
Behavioral task
behavioral1
Sample
9a111588a7db15b796421bd13a949cd4
Resource
debian9-armhf-20231215-en
General
-
Target
9a111588a7db15b796421bd13a949cd4
-
Size
93KB
-
MD5
9a111588a7db15b796421bd13a949cd4
-
SHA1
034c8c51a58be11ca620ce3eb0d43d5a59275d2f
-
SHA256
e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0
-
SHA512
820053864dd506fcf7c126f4a8df72ee6113ec07baaa2f440739782eb06e2768ee3dba5ba0c8e89d9c0dd03dffc51027e455f73601f41c07e02b19eef69f4aa9
-
SSDEEP
1536:pymLLU1F5kHIrIj0D6rhfd+lK3exiTCzxNtI4sZLi6UEbFEBFaW1EH6t6wfPP/Q:2F+ooxalK3exiTOijZLdUEbFlWPP/Q
Malware Config
Signatures
-
Contacts a large (1172) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
Processes:
resource yara_rule /usr/networks patched_upx -
Changes its process name 1 IoCs
Processes:
description ioc pid Changes the process name, possibly in an attempt to hide itself sshd 662 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Processes:
resource yara_rule /usr/networks upx -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Processes:
description ioc File opened for modification /etc/init.d/keyboard-setup.sh File opened for modification /etc/init.d/hwclock.sh File opened for modification /etc/init.d/S95baby.sh File opened for modification /etc/init.d/console-setup.sh -
Writes file to system bin folder 1 TTPs 2 IoCs
Processes:
description ioc File opened for modification /bin/watchdog File opened for modification /sbin/watchdog -
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/raw File opened for reading /proc/net/tcp
Processes
-
/tmp/9a111588a7db15b796421bd13a949cd4/tmp/9a111588a7db15b796421bd13a949cd41⤵PID:659
-
/bin/shsh -c "iptables -I INPUT -p tcp --destination-port 58000 -j DROP"1⤵PID:669
-
/sbin/iptablesiptables -I INPUT -p tcp --destination-port 58000 -j DROP2⤵PID:672
-
-
/bin/shsh -c "iptables -I OUTPUT -p tcp --source-port 58000 -j DROP"1⤵PID:679
-
/sbin/iptablesiptables -I OUTPUT -p tcp --source-port 58000 -j DROP2⤵PID:680
-
-
/bin/shsh -c "cfgtool set /mnt/jffs2/hw_ctree.xml InternetGatewayDevice.ManagementServer URL \"http://127.0.0.1\""1⤵PID:683
-
/bin/shsh -c "cfgtool set /mnt/jffs2/hw_ctree.xml InternetGatewayDevice.ManagementServer ConnectionRequestPassword \"acsMozi\""1⤵PID:684
-
/bin/shsh -c "iptables -I INPUT -p tcp --destination-port 35000 -j DROP"1⤵PID:685
-
/sbin/iptablesiptables -I INPUT -p tcp --destination-port 35000 -j DROP2⤵PID:687
-
-
/bin/shsh -c "iptables -I INPUT -p tcp --destination-port 50023 -j DROP"1⤵PID:688
-
/sbin/iptablesiptables -I INPUT -p tcp --destination-port 50023 -j DROP2⤵PID:689
-
-
/bin/shsh -c "iptables -I OUTPUT -p tcp --source-port 50023 -j DROP"1⤵PID:690
-
/sbin/iptablesiptables -I OUTPUT -p tcp --source-port 50023 -j DROP2⤵PID:692
-
-
/bin/shsh -c "iptables -I OUTPUT -p tcp --source-port 35000 -j DROP"1⤵PID:693
-
/sbin/iptablesiptables -I OUTPUT -p tcp --source-port 35000 -j DROP2⤵PID:694
-
-
/bin/shsh -c "iptables -I INPUT -p tcp --destination-port 7547 -j DROP"1⤵PID:695
-
/sbin/iptablesiptables -I INPUT -p tcp --destination-port 7547 -j DROP2⤵PID:696
-
-
/bin/shsh -c "iptables -I OUTPUT -p tcp --source-port 7547 -j DROP"1⤵PID:697
-
/sbin/iptablesiptables -I OUTPUT -p tcp --source-port 7547 -j DROP2⤵PID:698
-
-
/bin/shsh -c "iptables -I INPUT -p tcp --destination-port 48927 -j ACCEPT"1⤵PID:699
-
/sbin/iptablesiptables -I INPUT -p tcp --destination-port 48927 -j ACCEPT2⤵PID:700
-
-
/bin/shsh -c "iptables -I OUTPUT -p tcp --source-port 48927 -j ACCEPT"1⤵PID:701
-
/sbin/iptablesiptables -I OUTPUT -p tcp --source-port 48927 -j ACCEPT2⤵PID:702
-
-
/bin/shsh -c "iptables -I PREROUTING -t nat -p tcp --destination-port 48927 -j ACCEPT"1⤵PID:703
-
/sbin/iptablesiptables -I PREROUTING -t nat -p tcp --destination-port 48927 -j ACCEPT2⤵PID:704
-
-
/bin/shsh -c "iptables -I POSTROUTING -t nat -p tcp --source-port 48927 -j ACCEPT"1⤵PID:713
-
/sbin/iptablesiptables -I POSTROUTING -t nat -p tcp --source-port 48927 -j ACCEPT2⤵PID:714
-
-
/bin/shsh -c "iptables -I INPUT -p udp --destination-port 5060 -j ACCEPT"1⤵PID:764
-
/sbin/iptablesiptables -I INPUT -p udp --destination-port 5060 -j ACCEPT2⤵PID:765
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD51b3235ba10fc04836c941d3d27301956
SHA18909655763143702430b8c58b3ae3b04cfd3a29c
SHA25601ba1fb41632594997a41d0c3a911ae5b3034d566ebb991ef76ad76e6f9e283a
SHA51298bdb5c266222ccbd63b6f80c87e501c8033dc53b0513d300b8da50e39a207a0b69f8cd3ecc4a128dec340a1186779fedd1049c9b0a70e90d2cb3ae6ebfa4c4d
-
Filesize
93KB
MD59a111588a7db15b796421bd13a949cd4
SHA1034c8c51a58be11ca620ce3eb0d43d5a59275d2f
SHA256e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0
SHA512820053864dd506fcf7c126f4a8df72ee6113ec07baaa2f440739782eb06e2768ee3dba5ba0c8e89d9c0dd03dffc51027e455f73601f41c07e02b19eef69f4aa9