Analysis

  • max time kernel
    6s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    30-06-2024 03:12

General

  • Target

    c28ee2f2b8e72bfe7052c290d86ebbbd7efd58d54163c81565eb0985b27b667a.elf

  • Size

    125KB

  • MD5

    a2ae553b89389d515b47660ec718cf5e

  • SHA1

    c07eb050592dba7c646123942b5f0a6fd253caee

  • SHA256

    c28ee2f2b8e72bfe7052c290d86ebbbd7efd58d54163c81565eb0985b27b667a

  • SHA512

    16d0b23566ca9f658eff815348c14adc61286319ce196e88d2f7d2def1869bf79b15b756853811a954abf0f1ff478b26a4ade59fe8460c680491a29e7264c1e2

  • SSDEEP

    3072:wQrGMMCztfFJsd6BFif4qB92KUe4SaROJIgrU257NPVvidlsk7Fb1lxWy:BrvztfFJsAmpcKUe4SaRO6grUhzFb1lJ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/c28ee2f2b8e72bfe7052c290d86ebbbd7efd58d54163c81565eb0985b27b667a.elf
    /tmp/c28ee2f2b8e72bfe7052c290d86ebbbd7efd58d54163c81565eb0985b27b667a.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Reads system network configuration
    PID:703

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads