Analysis

  • max time kernel
    6s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    28-06-2024 17:31

General

  • Target

    33a8f48fbd45a071419a7213affd014d.elf

  • Size

    106KB

  • MD5

    33a8f48fbd45a071419a7213affd014d

  • SHA1

    ab024426e73c70f8e5eb0903080e81444bcef54b

  • SHA256

    ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d

  • SHA512

    75bd9de735baa8daa0e0ff3cc4ab942134bd3948097e8385bf410ad345643b370f02ef3e8ddf6002745e64524cbbcccd170a4fdf10036ee253e962fd6ef571dc

  • SSDEEP

    3072:2bB8eJ2RC0w4NQJYrFzguMAt8nrMjrkvB9wrVMtvAT00LKrcTw0nINLzsrI5:2bB8w2fNW9cTw0nINLzsr

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/33a8f48fbd45a071419a7213affd014d.elf
    /tmp/33a8f48fbd45a071419a7213affd014d.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Changes its process name
    • Reads system network configuration
    PID:696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads