Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20231215-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    20-12-2023 10:06

General

  • Target

    9fe5ea604ed3d4e68f75489ce286aabb

  • Size

    199KB

  • MD5

    9fe5ea604ed3d4e68f75489ce286aabb

  • SHA1

    2639671a6bfce4bb16efdbdf2bbf2f1397d38390

  • SHA256

    8df9c2b7bf085261e91c2ceae0c032b693721f5ba15b718b989129cad6c40024

  • SHA512

    d5ed06934e902bfd6ea420a5dbc455508897006f01ccbbe4bdcc1c84c7490c07c48c76b0ecacb7581faf4f81d26fd7ae2b4a783d27ffc379a455ecf308cd4926

  • SSDEEP

    3072:9hcxBZYmBqgTQ3xSdL76KIVT1i+YHx+QV5tVpk6chD3geyHiEo1yFNOBPWruMIlG:lgNogF9SOrcXgDDTlPWDyaejZh

Score
9/10

Malware Config

Signatures

  • Contacts a large (45097) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/9fe5ea604ed3d4e68f75489ce286aabb
    /tmp/9fe5ea604ed3d4e68f75489ce286aabb
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads