Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20231221-en -
resource tags
arch:mipsimage:debian9-mipsbe-20231221-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
19/02/2024, 06:23
Behavioral task
behavioral1
Sample
e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf
Resource
debian9-mipsbe-20231221-en
General
-
Target
e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf
-
Size
82KB
-
MD5
cf953117ecf53bafd39c1ba4e3d71a7b
-
SHA1
72a1e2d71ba3e753015be493380c2177dee5a946
-
SHA256
e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a
-
SHA512
0fbcb9adfa4ad18288b49be0e98212848ba0a22401bc4d8462f7de391369fa4dc2e01f5fea4e74b424ddada1ade87b50cb2e4fd021218df75c144d5da9ba242c
-
SSDEEP
1536:im2yFrszc6u0vTJ2VdKXrE1nHkiRZKyLXPjQjc:IyFrau07cVSE1nHkiRZKyL/jQc
Malware Config
Signatures
-
Contacts a large (40886) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 714 e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf File opened for reading /proc/net/tcp Process not Found -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf File opened for reading /proc/net/tcp Process not Found -
Reads runtime system information 50 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/675/fd File opened for reading /proc/733/exe File opened for reading /proc/381/fd File opened for reading /proc/830/exe File opened for reading /proc/706/exe File opened for reading /proc/831/exe File opened for reading /proc/718/exe File opened for reading /proc/377/fd File opened for reading /proc/718/fd File opened for reading /proc/433/fd File opened for reading /proc/699/fd File opened for reading /proc/834/exe File opened for reading /proc/358/fd File opened for reading /proc/726/fd File opened for reading /proc/738/fd File opened for reading /proc/750/exe File opened for reading /proc/152/fd File opened for reading /proc/354/fd File opened for reading /proc/781/exe File opened for reading /proc/792/exe File opened for reading /proc/333/fd File opened for reading /proc/723/fd File opened for reading /proc/733/fd File opened for reading /proc/681/exe File opened for reading /proc/668/fd File opened for reading /proc/700/fd File opened for reading /proc/249/fd File opened for reading /proc/357/fd File opened for reading /proc/359/fd File opened for reading /proc/785/exe File opened for reading /proc/433/exe File opened for reading /proc/675/exe File opened for reading /proc/682/exe File opened for reading /proc/1/fd File opened for reading /proc/709/fd File opened for reading /proc/668/exe File opened for reading /proc/725/fd File opened for reading /proc/681/fd File opened for reading /proc/699/exe File opened for reading /proc/837/exe File opened for reading /proc/172/fd File opened for reading /proc/379/fd File opened for reading /proc/679/exe File opened for reading /proc/829/exe File opened for reading /proc/679/fd File opened for reading /proc/682/fd File opened for reading /proc/705/exe File opened for reading /proc/841/exe File opened for reading /proc/735/fd File opened for reading /proc/702/exe -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf