Analysis

  • max time kernel
    152s
  • max time network
    69s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    08-10-2024 12:28

General

  • Target

    020F1FA6072108C79ED6F553F4F8B08E157BF17F9C260A76353300230FED09F0

  • Size

    83KB

  • MD5

    5377e8f2ebdb280216c37a6195da9d6c

  • SHA1

    b54c705193b7963a0d40699a91cdb34fedecbe88

  • SHA256

    020f1fa6072108c79ed6f553f4f8b08e157bf17f9c260a76353300230fed09f0

  • SHA512

    65e5aec56ddde56f245a20f88553d2f76bd7dd8e1940e9d49637d51a868fe73003b8a95fffeb9481110579f6ee4790fc9af1668d435930d4c01b116490908eed

  • SSDEEP

    1536:yYI0ARqw1qAEW67UIWi7M8gmfmJo0WgswnD6Efyq8PxlRkp2K3/J1V+uBNu:yYI0ARqw1qAEv7UIFM8oJorFquyjkRks

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system routing table 1 TTPs 1 IoCs

    Gets active network interfaces from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 3 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/020F1FA6072108C79ED6F553F4F8B08E157BF17F9C260A76353300230FED09F0
    /tmp/020F1FA6072108C79ED6F553F4F8B08E157BF17F9C260A76353300230FED09F0
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Reads system routing table
    • Changes its process name
    • Reads system network configuration
    • Reads runtime system information
    • Writes file to tmp directory
    PID:703
    • /bin/sh
      sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
      2⤵
        PID:708
        • /sbin/iptables
          iptables -A INPUT -p tcp --destination-port 23 -j DROP
          3⤵
            PID:710
        • /bin/sh
          sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
          2⤵
            PID:722
            • /sbin/iptables
              iptables -A INPUT -p tcp --destination-port 7547 -j DROP
              3⤵
                PID:724
            • /bin/sh
              sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
              2⤵
                PID:727
                • /sbin/iptables
                  iptables -A INPUT -p tcp --destination-port 5555 -j DROP
                  3⤵
                    PID:729
                • /bin/sh
                  sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
                  2⤵
                    PID:731
                    • /sbin/iptables
                      iptables -A INPUT -p tcp --destination-port 5358 -j DROP
                      3⤵
                        PID:733
                    • /bin/sh
                      sh -c "iptables -D INPUT -j CWMP_CR"
                      2⤵
                        PID:736
                        • /sbin/iptables
                          iptables -D INPUT -j CWMP_CR
                          3⤵
                            PID:737
                        • /bin/sh
                          sh -c "iptables -X CWMP_CR"
                          2⤵
                          • System Network Configuration Discovery
                          PID:740
                          • /sbin/iptables
                            iptables -X CWMP_CR
                            3⤵
                              PID:741
                          • /bin/sh
                            sh -c "iptables -I INPUT -p udp --dport 50971 -j ACCEPT"
                            2⤵
                              PID:743
                              • /sbin/iptables
                                iptables -I INPUT -p udp --dport 50971 -j ACCEPT
                                3⤵
                                  PID:744

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • memory/703-1-0x00400000-0x0047a6c0-memory.dmp