Analysis
-
max time kernel
149s -
max time network
154s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
06/07/2024, 01:24
General
-
Target
6697424e340a192d770954df1daee7d6f9a3e756752b2b083bc938c40a243fc3.elf
-
Size
54KB
-
MD5
a17ab9a39863027c820f57df525764b2
-
SHA1
44fa97f4cd035f7c0d76262875a1cb40aefb4fed
-
SHA256
6697424e340a192d770954df1daee7d6f9a3e756752b2b083bc938c40a243fc3
-
SHA512
a6b1bbac1ad97fd23f7e51de3b87abaf1affcb73aa672f11fa2b5f96bce3179a542e18b52197b9af059dd0514ac10d1985f03bac0a71bad4b9ba8ad18a83490b
-
SSDEEP
1536:bYtDDq5xOBhnnG4CPd+PHwFvC2QdJpAeXW:bADgxOBhnPCk/wUtJpAeXW
Malware Config
Extracted
Family
mirai
C2
230.btc-f2pool.top
Signatures
-
Contacts a large (34042) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 666 6697424e340a192d770954df1daee7d6f9a3e756752b2b083bc938c40a243fc3.elf -
Reads runtime system information 2 IoCs
Reads data from /proc virtual filesystem.
description ioc Process File opened for reading /proc/self/exe 6697424e340a192d770954df1daee7d6f9a3e756752b2b083bc938c40a243fc3.elf File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/6697424e340a192d770954df1daee7d6f9a3e756752b2b083bc938c40a243fc3.elf/tmp/6697424e340a192d770954df1daee7d6f9a3e756752b2b083bc938c40a243fc3.elf1⤵
- Changes its process name
- Reads runtime system information
PID:666 -
/bin/sh/bin/sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/6697424e340a192d770954df1daee7d6f9a3e756752b2b083bc938c40a243fc3.elf dsbin/busybox; chmod 777 bin/busybox"2⤵
- Writes file to tmp directory
PID:670 -
/bin/rmrm -rf bin/busybox3⤵PID:671
-
-
/bin/mkdirmkdir "bin"3⤵
- Reads runtime system information
PID:673
-
-
/bin/chmodchmod 777 "bin/busybox"3⤵PID:678
-
-