Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    26/12/2023, 15:07

General

  • Target

    77e61b9fbbe097a47bc2cfd7907b9b01

  • Size

    47KB

  • MD5

    77e61b9fbbe097a47bc2cfd7907b9b01

  • SHA1

    e579323dc45416da4c366b7a8ebcf31861795d19

  • SHA256

    121877d33210299a5e0f8f46a3fbd99ff2637b3de940392928317af3ff988143

  • SHA512

    1c13681589e43953d0fafc2a48361137317c266828137a42d0f9566dad689cfaad87f48fbe22cf7550438016ad5af7b2dfbd0a785421579e65a3c91731cad7f9

  • SSDEEP

    768:QzHjH7qV0sr/ayZRQOSLYCzA2v2HJwqK5dsgdn8cwT+v6kJJOJhAK7KBC5PDyW9y:MjHehREdA2Wyn3rd8cSREKwC5Dw

Malware Config

Extracted

Family

mirai

Botnet

KYTON

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (142806) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/77e61b9fbbe097a47bc2cfd7907b9b01
    /tmp/77e61b9fbbe097a47bc2cfd7907b9b01
    1⤵
    • Changes its process name
    PID:709

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads