Analysis

  • max time kernel
    151s
  • max time network
    129s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 11:55

General

  • Target

    aed0bf84c27ecc25d01925110c66283e

  • Size

    50KB

  • MD5

    aed0bf84c27ecc25d01925110c66283e

  • SHA1

    c4ba75ffef3a09a9fa7d952813a7186650c83725

  • SHA256

    3724d0b6a26f03f37a05545e05df437e34aae7984e439cde0bc70b54b4cb6898

  • SHA512

    4c7035bfb79480c4d136f84d23f57d59a1be6ebcfff36225b4285e431b2a707b2ac5187b9c5c56d6775437c29941f396e80ce584fab79694d7616034a0783088

  • SSDEEP

    768:ZQHXml16Wjl1DC059OOZ6/7wBJ4Yp2BWKk51WdrPBONsjyKo4kNLkGeQTcEKTcMx:bfMBWBWdrBvIeDJTEDGhtrHvux4nA

Score
9/10

Malware Config

Signatures

  • Contacts a large (10077) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/aed0bf84c27ecc25d01925110c66283e
    /tmp/aed0bf84c27ecc25d01925110c66283e
    1⤵
    • Changes its process name
    PID:655

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Replay Monitor

Loading Replay Monitor...

Downloads