Analysis
-
max time kernel
16s -
max time network
133s -
platform
debian-9_mips -
resource
debian9-mipsbe-20231222-en -
resource tags
arch:mipsimage:debian9-mipsbe-20231222-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
30-12-2023 00:32
Behavioral task
behavioral1
Sample
08a82dda567c4db68cd0bb711ffc36f5
Resource
debian9-mipsbe-20231222-en
General
-
Target
08a82dda567c4db68cd0bb711ffc36f5
-
Size
300KB
-
MD5
08a82dda567c4db68cd0bb711ffc36f5
-
SHA1
6ad2810a73f5f200bfc7200a29aecd72c2b9eba5
-
SHA256
e653acd236773d44c8cdb8ba609719edcf4e36873905a1c8be4d41a877141b2b
-
SHA512
5b01b96ac4374517fd73f5a6a5058493ebb716c2101e333950faf9a289b29baa262f8a221efcc6207c64f293ae028f2ad0cd50974dc945ababbf9cc11380d607
-
SSDEEP
6144:7O/QJHZweEL/NOjCHm7FZZncXoNsKqqfPqOJ:78QpZsKCaiXHKqoPqOJ
Malware Config
Signatures
-
Contacts a large (21635) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Changes the process name, possibly in an attempt to hide itself sshd 732 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp 08a82dda567c4db68cd0bb711ffc36f5 -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc File opened for reading /proc/net/route -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog -
Reads system network configuration 1 TTPs 3 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp 08a82dda567c4db68cd0bb711ffc36f5 File opened for reading /proc/net/raw 08a82dda567c4db68cd0bb711ffc36f5 File opened for reading /proc/net/route Process not Found -
Reads runtime system information 64 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/8/stat killall File opened for reading /proc/15/stat killall File opened for reading /proc/18/stat killall File opened for reading /proc/72/stat killall File opened for reading /proc/82/stat killall File opened for reading /proc/152/cmdline killall File opened for reading /proc/13/stat killall File opened for reading /proc/161/stat killall File opened for reading /proc/445/stat killall File opened for reading /proc/715/stat killall File opened for reading /proc/filesystems killall File opened for reading /proc/17/stat killall File opened for reading /proc/19/stat killall File opened for reading /proc/24/stat killall File opened for reading /proc/70/stat killall File opened for reading /proc/71/stat killall File opened for reading /proc/396/stat killall File opened for reading /proc/2/stat killall File opened for reading /proc/4/stat killall File opened for reading /proc/21/stat killall File opened for reading /proc/720/stat killall File opened for reading /proc/732/cmdline killall File opened for reading /proc/6/stat killall File opened for reading /proc/37/stat killall File opened for reading /proc/152/stat killall File opened for reading /proc/350/stat killall File opened for reading /proc/686/stat killall File opened for reading /proc/714/cmdline killall File opened for reading /proc/723/cmdline killall File opened for reading /proc/733/stat killall File opened for reading /proc/7/stat killall File opened for reading /proc/392/stat killall File opened for reading /proc/74/stat killall File opened for reading /proc/726/stat killall File opened for reading /proc/739/stat killall File opened for reading /proc/5/stat killall File opened for reading /proc/9/stat killall File opened for reading /proc/16/stat killall File opened for reading /proc/20/stat killall File opened for reading /proc/77/stat killall File opened for reading /proc/246/stat killall File opened for reading /proc/715/cmdline killall File opened for reading /proc/76/stat killall File opened for reading /proc/79/stat killall File opened for reading /proc/127/stat killall File opened for reading /proc/381/stat killall File opened for reading /proc/690/stat killall File opened for reading /proc/22/stat killall File opened for reading /proc/75/stat killall File opened for reading /proc/110/stat killall File opened for reading /proc/3/stat killall File opened for reading /proc/23/stat killall File opened for reading /proc/348/stat killall File opened for reading /proc/717/stat killall File opened for reading /proc/719/stat killall File opened for reading /proc/14/stat killall File opened for reading /proc/36/stat killall File opened for reading /proc/126/stat killall File opened for reading /proc/714/stat killall File opened for reading /proc/self/exe 08a82dda567c4db68cd0bb711ffc36f5 File opened for reading /proc/127/cmdline killall File opened for reading /proc/352/stat killall File opened for reading /proc/732/stat killall File opened for reading /proc/736/stat killall -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/.ips 08a82dda567c4db68cd0bb711ffc36f5
Processes
-
/tmp/08a82dda567c4db68cd0bb711ffc36f5/tmp/08a82dda567c4db68cd0bb711ffc36f51⤵
- Enumerates active TCP sockets
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:729
-
/bin/shsh -c "killall -9 telnetd utelnetd scfgmgr"1⤵PID:733
-
/usr/bin/killallkillall -9 telnetd utelnetd scfgmgr2⤵
- Reads runtime system information
PID:734
-