Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240226-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
14-03-2024 03:23
General
-
Target
c78e7bd8b4d26a7e5b073bbd98cf2909
-
Size
30KB
-
MD5
c78e7bd8b4d26a7e5b073bbd98cf2909
-
SHA1
f0c4195235a0774032bfcf944c2aae54180d52a7
-
SHA256
74e04c6de8b44d454bf5ffcaad4102e1c5fe6d37dc8dc87d975d0ee83aaca631
-
SHA512
17032bf31a646b709f0346824ec5d78c5721bdbc7163a1450f0bc508c2b9bd00a7409bcfa0ded34a3e531684a3e4a8325e31e85f3e4e8776d83ff87b0dd3cbb4
-
SSDEEP
768:6WVQ1DPy6IdNXiWoD5u2t6duxoqt3PDKmkuJgGlzDpbuR1J+3:6We1e6gXj40duxoqRfVJuq
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (20390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 43 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/560/fd File opened for reading /proc/560/exe File opened for reading /proc/686/exe File opened for reading /proc/703/exe File opened for reading /proc/337/fd File opened for reading /proc/333/fd File opened for reading /proc/406/fd File opened for reading /proc/700/fd File opened for reading /proc/706/exe File opened for reading /proc/722/exe File opened for reading /proc/753/exe File opened for reading /proc/327/fd File opened for reading /proc/376/fd File opened for reading /proc/719/fd File opened for reading /proc/406/exe File opened for reading /proc/612/exe File opened for reading /proc/701/exe File opened for reading /proc/332/fd File opened for reading /proc/701/fd File opened for reading /proc/713/fd File opened for reading /proc/716/fd File opened for reading /proc/575/exe File opened for reading /proc/716/exe File opened for reading /proc/1/fd File opened for reading /proc/169/fd File opened for reading /proc/334/fd File opened for reading /proc/612/fd File opened for reading /proc/709/fd File opened for reading /proc/721/fd File opened for reading /proc/700/exe File opened for reading /proc/705/exe File opened for reading /proc/148/fd File opened for reading /proc/575/fd File opened for reading /proc/611/fd File opened for reading /proc/686/fd File opened for reading /proc/709/exe File opened for reading /proc/611/exe File opened for reading /proc/242/fd File opened for reading /proc/712/fd File opened for reading /proc/715/fd File opened for reading /proc/729/exe File opened for reading /proc/377/fd File opened for reading /proc/386/fd
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/707-1-0x00400000-0x00455a28-memory.dmp