Analysis

  • max time kernel
    39s
  • max time network
    41s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 09:07

General

  • Target

    9a111588a7db15b796421bd13a949cd4

  • Size

    93KB

  • MD5

    9a111588a7db15b796421bd13a949cd4

  • SHA1

    034c8c51a58be11ca620ce3eb0d43d5a59275d2f

  • SHA256

    e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0

  • SHA512

    820053864dd506fcf7c126f4a8df72ee6113ec07baaa2f440739782eb06e2768ee3dba5ba0c8e89d9c0dd03dffc51027e455f73601f41c07e02b19eef69f4aa9

  • SSDEEP

    1536:pymLLU1F5kHIrIj0D6rhfd+lK3exiTCzxNtI4sZLi6UEbFEBFaW1EH6t6wfPP/Q:2F+ooxalK3exiTOijZLdUEbFlWPP/Q

Malware Config

Signatures

  • Contacts a large (1172) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Modifies init.d 1 TTPs 4 IoCs

    Adds/modifies system service, likely for persistence.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads system network configuration 1 TTPs 2 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/9a111588a7db15b796421bd13a949cd4
    /tmp/9a111588a7db15b796421bd13a949cd4
    1⤵
      PID:659
    • /bin/sh
      sh -c "iptables -I INPUT -p tcp --destination-port 58000 -j DROP"
      1⤵
        PID:669
        • /sbin/iptables
          iptables -I INPUT -p tcp --destination-port 58000 -j DROP
          2⤵
            PID:672
        • /bin/sh
          sh -c "iptables -I OUTPUT -p tcp --source-port 58000 -j DROP"
          1⤵
            PID:679
            • /sbin/iptables
              iptables -I OUTPUT -p tcp --source-port 58000 -j DROP
              2⤵
                PID:680
            • /bin/sh
              sh -c "cfgtool set /mnt/jffs2/hw_ctree.xml InternetGatewayDevice.ManagementServer URL \"http://127.0.0.1\""
              1⤵
                PID:683
              • /bin/sh
                sh -c "cfgtool set /mnt/jffs2/hw_ctree.xml InternetGatewayDevice.ManagementServer ConnectionRequestPassword \"acsMozi\""
                1⤵
                  PID:684
                • /bin/sh
                  sh -c "iptables -I INPUT -p tcp --destination-port 35000 -j DROP"
                  1⤵
                    PID:685
                    • /sbin/iptables
                      iptables -I INPUT -p tcp --destination-port 35000 -j DROP
                      2⤵
                        PID:687
                    • /bin/sh
                      sh -c "iptables -I INPUT -p tcp --destination-port 50023 -j DROP"
                      1⤵
                        PID:688
                        • /sbin/iptables
                          iptables -I INPUT -p tcp --destination-port 50023 -j DROP
                          2⤵
                            PID:689
                        • /bin/sh
                          sh -c "iptables -I OUTPUT -p tcp --source-port 50023 -j DROP"
                          1⤵
                            PID:690
                            • /sbin/iptables
                              iptables -I OUTPUT -p tcp --source-port 50023 -j DROP
                              2⤵
                                PID:692
                            • /bin/sh
                              sh -c "iptables -I OUTPUT -p tcp --source-port 35000 -j DROP"
                              1⤵
                                PID:693
                                • /sbin/iptables
                                  iptables -I OUTPUT -p tcp --source-port 35000 -j DROP
                                  2⤵
                                    PID:694
                                • /bin/sh
                                  sh -c "iptables -I INPUT -p tcp --destination-port 7547 -j DROP"
                                  1⤵
                                    PID:695
                                    • /sbin/iptables
                                      iptables -I INPUT -p tcp --destination-port 7547 -j DROP
                                      2⤵
                                        PID:696
                                    • /bin/sh
                                      sh -c "iptables -I OUTPUT -p tcp --source-port 7547 -j DROP"
                                      1⤵
                                        PID:697
                                        • /sbin/iptables
                                          iptables -I OUTPUT -p tcp --source-port 7547 -j DROP
                                          2⤵
                                            PID:698
                                        • /bin/sh
                                          sh -c "iptables -I INPUT -p tcp --destination-port 48927 -j ACCEPT"
                                          1⤵
                                            PID:699
                                            • /sbin/iptables
                                              iptables -I INPUT -p tcp --destination-port 48927 -j ACCEPT
                                              2⤵
                                                PID:700
                                            • /bin/sh
                                              sh -c "iptables -I OUTPUT -p tcp --source-port 48927 -j ACCEPT"
                                              1⤵
                                                PID:701
                                                • /sbin/iptables
                                                  iptables -I OUTPUT -p tcp --source-port 48927 -j ACCEPT
                                                  2⤵
                                                    PID:702
                                                • /bin/sh
                                                  sh -c "iptables -I PREROUTING -t nat -p tcp --destination-port 48927 -j ACCEPT"
                                                  1⤵
                                                    PID:703
                                                    • /sbin/iptables
                                                      iptables -I PREROUTING -t nat -p tcp --destination-port 48927 -j ACCEPT
                                                      2⤵
                                                        PID:704
                                                    • /bin/sh
                                                      sh -c "iptables -I POSTROUTING -t nat -p tcp --source-port 48927 -j ACCEPT"
                                                      1⤵
                                                        PID:713
                                                        • /sbin/iptables
                                                          iptables -I POSTROUTING -t nat -p tcp --source-port 48927 -j ACCEPT
                                                          2⤵
                                                            PID:714
                                                        • /bin/sh
                                                          sh -c "iptables -I INPUT -p udp --destination-port 5060 -j ACCEPT"
                                                          1⤵
                                                            PID:764
                                                            • /sbin/iptables
                                                              iptables -I INPUT -p udp --destination-port 5060 -j ACCEPT
                                                              2⤵
                                                                PID:765

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • /etc/rcS.d/S95baby.sh

                                                              Filesize

                                                              25B

                                                              MD5

                                                              1b3235ba10fc04836c941d3d27301956

                                                              SHA1

                                                              8909655763143702430b8c58b3ae3b04cfd3a29c

                                                              SHA256

                                                              01ba1fb41632594997a41d0c3a911ae5b3034d566ebb991ef76ad76e6f9e283a

                                                              SHA512

                                                              98bdb5c266222ccbd63b6f80c87e501c8033dc53b0513d300b8da50e39a207a0b69f8cd3ecc4a128dec340a1186779fedd1049c9b0a70e90d2cb3ae6ebfa4c4d

                                                            • /usr/networks

                                                              Filesize

                                                              93KB

                                                              MD5

                                                              9a111588a7db15b796421bd13a949cd4

                                                              SHA1

                                                              034c8c51a58be11ca620ce3eb0d43d5a59275d2f

                                                              SHA256

                                                              e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0

                                                              SHA512

                                                              820053864dd506fcf7c126f4a8df72ee6113ec07baaa2f440739782eb06e2768ee3dba5ba0c8e89d9c0dd03dffc51027e455f73601f41c07e02b19eef69f4aa9

                                                            • memory/659-1-0x00008000-0x00060ce0-memory.dmp