Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231222-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    30/12/2023, 10:30

General

  • Target

    15f94b7859688a477a9dca58a7c2e741

  • Size

    68KB

  • MD5

    15f94b7859688a477a9dca58a7c2e741

  • SHA1

    0b433dbd3f40a4aa67dd49e45095a8e835834dba

  • SHA256

    199ea02c2c6c0558a0a533b21d7065fdc9e3645d3d6524e4a6951521c3e20111

  • SHA512

    a1a6dcadd102f42fbe53aae75d43a9053ebe84fb9774a035657adc8017cede200ab2d3de53dcd4691d66ac1bf1e864e7aec844c31dfbd160bfb7f222aa195a96

  • SSDEEP

    1536:74blEKw06Z1XjuxfEQ2qm5YB8t46zHMGJok:74bllw0Wc0484EH7Jok

Score
9/10

Malware Config

Signatures

  • Contacts a large (23510) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 31 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/15f94b7859688a477a9dca58a7c2e741
    /tmp/15f94b7859688a477a9dca58a7c2e741
    1⤵
    • Changes its process name
    PID:681

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads