Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20231221-en -
resource tags
arch:mipsimage:debian9-mipsbe-20231221-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
20/02/2024, 03:47
Behavioral task
behavioral1
Sample
e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf
Resource
debian9-mipsbe-20231221-en
General
-
Target
e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf
-
Size
82KB
-
MD5
cf953117ecf53bafd39c1ba4e3d71a7b
-
SHA1
72a1e2d71ba3e753015be493380c2177dee5a946
-
SHA256
e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a
-
SHA512
0fbcb9adfa4ad18288b49be0e98212848ba0a22401bc4d8462f7de391369fa4dc2e01f5fea4e74b424ddada1ade87b50cb2e4fd021218df75c144d5da9ba242c
-
SSDEEP
1536:im2yFrszc6u0vTJ2VdKXrE1nHkiRZKyLXPjQjc:IyFrau07cVSE1nHkiRZKyL/jQc
Malware Config
Signatures
-
Contacts a large (40826) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 710 e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 2 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp Process not Found File opened for reading /proc/net/tcp e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 2 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf File opened for reading /proc/net/tcp Process not Found -
Reads runtime system information 44 IoCs
Reads data from /proc virtual filesystem.
description ioc File opened for reading /proc/682/fd File opened for reading /proc/717/fd File opened for reading /proc/1/fd File opened for reading /proc/156/fd File opened for reading /proc/332/fd File opened for reading /proc/679/fd File opened for reading /proc/788/exe File opened for reading /proc/360/fd File opened for reading /proc/380/fd File opened for reading /proc/686/fd File opened for reading /proc/784/exe File opened for reading /proc/715/fd File opened for reading /proc/685/exe File opened for reading /proc/682/exe File opened for reading /proc/702/exe File opened for reading /proc/708/exe File opened for reading /proc/355/fd File opened for reading /proc/382/fd File opened for reading /proc/667/fd File opened for reading /proc/711/fd File opened for reading /proc/722/fd File opened for reading /proc/734/fd File opened for reading /proc/705/exe File opened for reading /proc/333/fd File opened for reading /proc/359/fd File opened for reading /proc/471/fd File opened for reading /proc/685/fd File opened for reading /proc/709/exe File opened for reading /proc/751/exe File opened for reading /proc/174/fd File opened for reading /proc/247/fd File opened for reading /proc/721/fd File opened for reading /proc/724/fd File opened for reading /proc/686/exe File opened for reading /proc/387/fd File opened for reading /proc/702/fd File opened for reading /proc/718/fd File opened for reading /proc/667/exe File opened for reading /proc/711/exe File opened for reading /proc/796/exe File opened for reading /proc/703/fd File opened for reading /proc/722/exe File opened for reading /proc/471/exe File opened for reading /proc/679/exe -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf e119df659c50e3a685b98b8c5b99f6e819df737dccacc97cc8839c5b8dad056a.elf