Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 10:27

General

  • Target

    a31ee6328cabe1e88e44ad95a957db1d

  • Size

    30KB

  • MD5

    a31ee6328cabe1e88e44ad95a957db1d

  • SHA1

    6892b505c5580aaa2c5d77986c31471f0bf4fe5a

  • SHA256

    a63368ba4516a42c0f5a755661c29b6a91a410469b34de4af182a8b7fcfc468e

  • SHA512

    2c27a31d91ce357a3f9badc2c79809142eb890924b0838a9c97cfbd8d08309a79f63c01987553d8830c7cdad9afa86fcf63895c2e42feda0c63594c598b78b7e

  • SSDEEP

    768:5isRBEX0H2C44pBngniEXk9mlQhr0ldcC8BUi3UJ:5hRBEO2KHqq9mOhrECA

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (20289) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 56 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/a31ee6328cabe1e88e44ad95a957db1d
    /tmp/a31ee6328cabe1e88e44ad95a957db1d
    1⤵
    • Reads runtime system information
    PID:656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads