Analysis

  • max time kernel
    123s
  • max time network
    157s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    01-07-2024 10:37

General

  • Target

    45.148.10.78-mips-2024-06-28T114027.elf

  • Size

    158KB

  • MD5

    37e6b4d93ace5aa57958fdb1a0c2d167

  • SHA1

    ed21d4dcb236668523c67dac83158a50611c3819

  • SHA256

    cf0f91ffe3af5f43475503df6f29970d4e5afc0643ff56ffc5efabf5ad1b6806

  • SHA512

    38bdd4c46bd65c449a3be98a6f7bd3ac50578c588df964a279e1f3c9bb15d56cc1063ea357b4c838306c1ea4ec2a03a249e0ae23eb98dbdc9c9ec56883494e19

  • SSDEEP

    3072:qtcVJ5G24rM7rFcLpsB4QIfgrUMnXNhO2qJCh5tdtczy9RP3Ql51eAFb1laWh3:qSg24I7rFxdIfgrUfsd0y9RP3Ql51ZFB

Score
9/10

Malware Config

Signatures

  • Contacts a large (51903) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Writes file to system bin folder 1 TTPs 1 IoCs
  • Changes its process name 1 IoCs
  • Enumerates kernel/hardware configuration 1 TTPs 3 IoCs

    Reads contents of /sys virtual filesystem to enumerate system information.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/45.148.10.78-mips-2024-06-28T114027.elf
    /tmp/45.148.10.78-mips-2024-06-28T114027.elf
    1⤵
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    • Enumerates kernel/hardware configuration
    • Reads runtime system information
    PID:711

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads