Resubmissions

16-04-2024 09:41

240416-lnrx2agd6t 7

16-04-2024 09:34

240416-lj2axagc7s 7

Analysis

  • max time kernel
    72s
  • max time network
    72s
  • platform
    debian-12_mipsel
  • resource
    debian12-mipsel-20240221-en
  • resource tags

    arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem
  • submitted
    16-04-2024 09:41

General

  • Target

    d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a

  • Size

    83KB

  • MD5

    b8ed2cb3e9fedec5b164ce84ad5a08d0

  • SHA1

    b45ef9ad0a29b0a402d1613b10c3f6e95686230c

  • SHA256

    d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a

  • SHA512

    98aa6abf6bc6b27ea2833122c468e436c267ef40c5ecbbd6446174d0859920e7b7bbcec617e12d7aa9e89e0492e5dcf4cf49a6208e7252fd0619047818454a31

  • SSDEEP

    1536:m3LqE6rUQWzVQR7iAGEcUT5PIi7pLqBNs4LOjcwf4nB6XuzGNy+iSc7tNUZM:mOE6PWo1T5bz4LVMXuzVNScWM

Score
7/10

Malware Config

Signatures

  • Changes its process name 1 IoCs
  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a
    /tmp/d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a
    1⤵
    • Modifies Watchdog functionality
    • Reads system routing table
    • Reads system network configuration
    PID:725
  • /bin/sh
    sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
    1⤵
      PID:738
    • /bin/sh
      sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
      1⤵
        PID:741
      • /bin/sh
        sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
        1⤵
          PID:743
        • /bin/sh
          sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
          1⤵
            PID:745
          • /bin/sh
            sh -c "iptables -D INPUT -j CWMP_CR"
            1⤵
              PID:748
            • /bin/sh
              sh -c "iptables -X CWMP_CR"
              1⤵
                PID:749
              • /bin/sh
                sh -c "iptables -I INPUT -p udp --dport 54832 -j ACCEPT"
                1⤵
                  PID:750

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Defense Evasion

                Impair Defenses

                1
                T1562

                Discovery

                System Network Connections Discovery

                1
                T1049

                System Network Configuration Discovery

                2
                T1016

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/725-1-0x00400000-0x0047a5a0-memory.dmp