Analysis

  • max time kernel
    14s
  • max time network
    17s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20231222-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20231222-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    24/01/2024, 21:09

General

  • Target

    72dc7c5966b66cefa2d8296651ee7d17

  • Size

    211KB

  • MD5

    72dc7c5966b66cefa2d8296651ee7d17

  • SHA1

    150825e47b7fe1c565c7ecbade7a8254946086a2

  • SHA256

    038465d0a4225c946eac5c7fdd87b594362e33f4102b696a6eb9294434c804f1

  • SHA512

    c9eb3bfd20b5d3b7c8ab2c358fe7b0ad5888c4c579934244daa6d990229aca87fd2dd78efbfe82f0fa9b1d96572a4afd9ba113aa4ca7c4b35cca3eb33c304618

  • SSDEEP

    6144:p3lOYoaja8xzx/0wsxzSinwKSDP99zBa77oNsKqq1:p1CG/jsxzXBSDP99zBa/HKqS

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/72dc7c5966b66cefa2d8296651ee7d17
    /tmp/72dc7c5966b66cefa2d8296651ee7d17
    1⤵
    • Enumerates active TCP sockets
    • Reads system network configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:730
  • /bin/sh
    sh -c "killall -9 telnetd utelnetd scfgmgr"
    1⤵
      PID:735
      • /usr/bin/killall
        killall -9 telnetd utelnetd scfgmgr
        2⤵
        • Reads runtime system information
        PID:737

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads