Analysis
-
max time kernel
149s -
max time network
152s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
05-07-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
5f90b43f04ba0454040c855894487c4b0a0d059e0e05c8f1a9b5ae47162418d8.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
5f90b43f04ba0454040c855894487c4b0a0d059e0e05c8f1a9b5ae47162418d8.elf
-
Size
74KB
-
MD5
bc54f0401d7ab5206671d41da278436f
-
SHA1
321cd783fd423faea05722587df00a55746e466b
-
SHA256
5f90b43f04ba0454040c855894487c4b0a0d059e0e05c8f1a9b5ae47162418d8
-
SHA512
d6a41971613d0ea8bdbd911e4b890c430397d355131765215d2d55389c71cd3f74dc5bfc45d8f624514f48bd76579fe9601f1362412897ccb354bd60e10910bc
-
SSDEEP
1536:5Vs/30tt4sqsU/ksl6Z25LW7s37Ft37LvxPhdjbD3nI8sRK:SEL4sqsbsl6Z25fPTf3nIg
Malware Config
Signatures
-
Contacts a large (86746) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 5f90b43f04ba0454040c855894487c4b0a0d059e0e05c8f1a9b5ae47162418d8.elf File opened for modification /dev/misc/watchdog 5f90b43f04ba0454040c855894487c4b0a0d059e0e05c8f1a9b5ae47162418d8.elf -
Renames itself 1 IoCs
pid Process 703 5f90b43f04ba0454040c855894487c4b0a0d059e0e05c8f1a9b5ae47162418d8.elf -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.254.162.59 Destination IP 168.235.111.72 Destination IP 178.254.22.166 Destination IP 81.169.136.222 Destination IP 137.220.55.93 Destination IP 194.36.144.87 Destination IP 81.169.136.222 Destination IP 65.21.1.106 Destination IP 51.158.108.203 -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 703 5f90b43f04ba0454040c855894487c4b0a0d059e0e05c8f1a9b5ae47162418d8.elf