Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
24-03-2024 07:37
General
-
Target
47b6d35e402f464f362e32d728f9b0b1
-
Size
31KB
-
MD5
47b6d35e402f464f362e32d728f9b0b1
-
SHA1
4a2b566ccf3bacaacaecf9408594114da0141325
-
SHA256
7a3a141da6cf5d5d60e9f9388799362b750c404518617406d03ad42722538e1d
-
SHA512
906772b0f1bb418a63b3c46b2978302e6febbc3c45b5eed81392a1acf201358a4c564c354f67235053f11a0a898a41a3237079336b3fd2dfe49f8668e8c3f33c
-
SSDEEP
384:/n6Ppdqf3I54hJulN7s1kNYTA/fKiFs4V9B6f8Oj0bCwFtNKpugmQ/zTRWGVCz0m:P4YuDs1kNJ/fKiFUf8OGCgG/bdWJ
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (20456) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/misc/watchdog File opened for modification /dev/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 46 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/772/exe File opened for reading /proc/548/fd File opened for reading /proc/701/fd File opened for reading /proc/704/fd File opened for reading /proc/714/exe File opened for reading /proc/742/exe File opened for reading /proc/141/fd File opened for reading /proc/372/fd File opened for reading /proc/513/fd File opened for reading /proc/694/exe File opened for reading /proc/707/exe File opened for reading /proc/768/exe File opened for reading /proc/319/fd File opened for reading /proc/371/fd File opened for reading /proc/680/fd File opened for reading /proc/704/exe File opened for reading /proc/698/exe File opened for reading /proc/381/fd File opened for reading /proc/694/fd File opened for reading /proc/696/fd File opened for reading /proc/695/exe File opened for reading /proc/791/exe File opened for reading /proc/707/fd File opened for reading /proc/500/exe File opened for reading /proc/552/exe File opened for reading /proc/1/fd File opened for reading /proc/315/fd File opened for reading /proc/346/fd File opened for reading /proc/552/fd File opened for reading /proc/706/fd File opened for reading /proc/680/exe File opened for reading /proc/165/fd File opened for reading /proc/397/fd File opened for reading /proc/703/fd File opened for reading /proc/699/exe File opened for reading /proc/513/exe File opened for reading /proc/548/exe File opened for reading /proc/693/exe File opened for reading /proc/316/fd File opened for reading /proc/344/fd File opened for reading /proc/500/fd File opened for reading /proc/693/fd File opened for reading /proc/710/fd File opened for reading /proc/225/fd File opened for reading /proc/719/exe File opened for reading /proc/741/exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/700-1-0x00400000-0x00456a28-memory.dmp