Analysis
-
max time kernel
149s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
14-10-2024 02:21
Behavioral task
behavioral1
Sample
fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf
Resource
debian9-mipsbe-20240729-en
General
-
Target
fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf
-
Size
82KB
-
MD5
ab1e17348ecb8600904daaec82323bf0
-
SHA1
852f74fc6ae2347bcb48a782814a2cd08114454a
-
SHA256
fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd
-
SHA512
a6c81e70e72d1fcc9bf5338d34c62edeedbd5490c002824a04197291b5dbc407b9e5b402edbe469134be4bd43ab3df3fdd06ba085f79060077492036ea711768
-
SSDEEP
768:2ty6IP7M/kq0INRhfuN2Eo9tl/deyLYwHuRHI0I4EH6gTUh7ZDYovZ73x/nL8y8/:Rakdn2Eo3eQaV6T+RYo99Be037WZT
Malware Config
Signatures
-
Contacts a large (37114) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 718 sh 727 chmod -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 717 fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf -
description ioc Process File opened for reading /proc/22/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/714/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/715/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/794/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/2/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/77/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/371/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/709/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/83/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/149/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/321/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/10/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/14/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/36/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/70/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/76/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/374/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/421/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/710/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/16/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/21/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/23/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/237/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/115/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/4/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/7/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/24/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/73/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/78/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/322/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/326/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/726/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/6/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/9/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/13/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/17/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/19/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/694/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/786/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/8/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/20/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/37/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/144/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/667/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/71/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/666/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/75/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/114/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/369/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/664/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/11/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/72/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/80/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/782/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/filesystems mv File opened for reading /proc/15/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/328/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/661/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/716/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/18/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/82/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/728/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/12/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf File opened for reading /proc/74/cmdline fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf/tmp/fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf1⤵
- Changes its process name
- Reads runtime system information
PID:717 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:718 -
/bin/rmrm -rf bin/systemd3⤵PID:720
-
-
/bin/mkdirmkdir bin3⤵PID:722
-
-
/bin/mvmv /tmp/fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd.elf bin/systemd3⤵
- Reads runtime system information
PID:724
-
-
/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:727
-
-