Analysis
-
max time kernel
150s -
max time network
153s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
13-04-2024 16:24
General
-
Target
SecuriteInfo.com.Linux.Siggen.9999.15399.29417.elf
-
Size
36KB
-
MD5
4abd1291946a20a608bce573851e2d4f
-
SHA1
4d8ae71f607db06581c96a003cdb79f41e47de52
-
SHA256
aa68bcd07480385acca1c2789c22a28f5606719e0987ca8e95da25f2d5569278
-
SHA512
dc8c54cc7bd753ccd647645f4fe28c23ed6287708b233f9c057a70beecf079374acce5908434473acb0ce5bac4d7e9cf0531347e826a8134e9cb0dfb0d20bd6a
-
SSDEEP
768:VWKJNd+lsAnOx8uQMMaQ9tIUnsriuAve3bQTjNVC2qaWt:VWKh2IpBMU+KiuTsTjNVCV
Malware Config
Extracted
mirai
LZRD
Signatures
-
Contacts a large (20622) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/net/tcp -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
description ioc File opened for reading /proc/net/tcp -
Reads runtime system information 34 IoCs
Reads data from /proc virtual filesystem.
Processes:
description ioc File opened for reading /proc/710/fd File opened for reading /proc/726/fd File opened for reading /proc/695/exe File opened for reading /proc/735/exe File opened for reading /proc/1/fd File opened for reading /proc/368/fd File opened for reading /proc/387/fd File opened for reading /proc/679/fd File opened for reading /proc/667/exe File opened for reading /proc/710/exe File opened for reading /proc/359/fd File opened for reading /proc/389/fd File opened for reading /proc/413/fd File opened for reading /proc/711/fd File opened for reading /proc/202/fd File opened for reading /proc/713/fd File opened for reading /proc/679/exe File opened for reading /proc/179/fd File opened for reading /proc/392/fd File opened for reading /proc/667/fd File opened for reading /proc/716/exe File opened for reading /proc/245/fd File opened for reading /proc/391/fd File opened for reading /proc/695/fd File opened for reading /proc/717/exe File opened for reading /proc/697/fd File opened for reading /proc/721/fd File opened for reading /proc/729/exe File opened for reading /proc/680/exe File opened for reading /proc/372/fd File opened for reading /proc/697/exe File opened for reading /proc/752/exe File opened for reading /proc/680/fd File opened for reading /proc/718/exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/725-1-0x00400000-0x00420d74-memory.dmp