Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    15/03/2024, 17:29

General

  • Target

    6c645e87b6350c19711a76359c947d7a.elf

  • Size

    151KB

  • MD5

    6c645e87b6350c19711a76359c947d7a

  • SHA1

    0ca10a31cbae4f4c977c0907a4ace457d288acb8

  • SHA256

    bf9cb35fbddfde3f1e78ef06cb6c5fd1cbb910faddd1f5bb7c870d675c47cbd6

  • SHA512

    1507e596cfdebe9db256ce20173d6832c586a08c71cc2febf1042c061bcd2faa57186ca8f1be52fc89596b594eec2dccf4ffbf5a5b2fe65d4105456c4d4184c0

  • SSDEEP

    3072:dgZc9h1jlnLA2PiXYeyCc8VNMVGuo9mrThPaLEnvPrNb:dd7lnLA2PiIeyZ8VWDo9mrThPaLEnvP5

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/6c645e87b6350c19711a76359c947d7a.elf
    /tmp/6c645e87b6350c19711a76359c947d7a.elf
    1⤵
    • Changes its process name
    • Reads system routing table
    • Reads system network configuration
    PID:707

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads