Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    20-12-2023 10:21

General

  • Target

    a1b2748c32464d356352f90e9bd1d4b3

  • Size

    90KB

  • MD5

    a1b2748c32464d356352f90e9bd1d4b3

  • SHA1

    b277900279e4f5377cb244fc1e627c93c1b4d40a

  • SHA256

    028ed26b1c3b68dd650b0ad357c92ba72cd606d7143d3ad44ee1b2b7fa18cfaa

  • SHA512

    894d12cc4e9fd56419632fb670d9ccc9f611efa926e4d3ef905a1800945d03ef6f0d8cf874bc17d71c928f19e0de2c6510b3a6bf57a505a4dbc7557a75e91d58

  • SSDEEP

    1536:q5/638c6z+q9S6qwHp7lPCzYnvLXbs2LOV6p:U/s8c6G6d02L

Score
9/10

Malware Config

Signatures

  • Contacts a large (20390) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 25 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/a1b2748c32464d356352f90e9bd1d4b3
    /tmp/a1b2748c32464d356352f90e9bd1d4b3
    1⤵
      PID:712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads