Analysis

  • max time kernel
    15s
  • max time network
    24s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20231222-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20231222-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    24-12-2023 22:44

General

  • Target

    16a9d0a22e69e66728747bbc3490b407

  • Size

    142KB

  • MD5

    16a9d0a22e69e66728747bbc3490b407

  • SHA1

    b91d9902e67ca9cd6d8df7cf9eca341e49ac62e9

  • SHA256

    fc9aa55efe4638867d5e5059820a322ecfbf785c76407e75fe33218df79eca6b

  • SHA512

    e90f0a2a9b157b5913238c5d4fe5fac33052bae3c3380a518d5c8f2106e1c918f40f41f8579be96713839f13013005058e86281a33d4bb6ac3015c1aa80e1830

  • SSDEEP

    3072:2glZ3FtCKXhkmHtZ9TEKzjfj/WMngyIfsJ0F7xPto:2IIKXhZtL7jOTyIG87X

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/16a9d0a22e69e66728747bbc3490b407
    /tmp/16a9d0a22e69e66728747bbc3490b407
    1⤵
    • Enumerates active TCP sockets
    • Reads system network configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:729
  • /bin/sh
    sh -c "killall -9 telnetd utelnetd scfgmgr"
    1⤵
      PID:734
      • /usr/bin/killall
        killall -9 telnetd utelnetd scfgmgr
        2⤵
        • Reads runtime system information
        PID:735

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/729-1-0x00400000-0x004c1f18-memory.dmp