Analysis
-
max time kernel
127s -
max time network
145s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
10-10-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
na.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
na.elf
-
Size
70KB
-
MD5
a089784465bf00170de07fba33cfcd64
-
SHA1
70232249f8aa23657b401c2b87dfc1d8bd0b145a
-
SHA256
f2215fa6d1b7eb3e43fd85348f1feba29e09e129de4cb7c3596ae7d270d6916f
-
SHA512
46775d5c61bf12ee3d3c6f1508e9e58da316941224431b85f5007db0007670026de9510c08b848ce581e74ece78a21639d1ae549106fbd823f931a2d7238d38c
-
SSDEEP
768:HAyrRVLCJKFJMOoQZSW7HSIHu3VO5UkMXqMh8K8wTmuqqr/kBIutcDsugutcDsF5:HkaoQXvO3VOYmkkvdWjKohLdTz
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
Processes:
na.elfdescription ioc Process File deleted /var/log/syslog na.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
na.elfdescription ioc Process File opened for modification /dev/watchdog na.elf File opened for modification /dev/misc/watchdog na.elf -
Renames itself 1 IoCs
Processes:
na.elfpid Process 698 na.elf -
Processes:
na.elfdescription ioc Process File deleted /var/log/daemon.log na.elf -
Reads process memory 1 TTPs 1 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
Processes:
na.elfdescription ioc Process File opened for reading /proc/1/maps na.elf -
Changes its process name 1 IoCs
Processes:
na.elfdescription ioc pid Process Changes the process name, possibly in an attempt to hide itself /sbin/udhcpc 698 na.elf