Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    28-10-2024 06:43

General

  • Target

    zermips.elf

  • Size

    59KB

  • MD5

    a24358e749172718412819178e55b80e

  • SHA1

    76d8ffcbfb8ae191310ddedaed4416e73739a6e0

  • SHA256

    b0832f4738ecc425a03c13ce0af610ffe73b55afcf8d814dcdd2af0e8dad9c64

  • SHA512

    17769e8d45637c9b6712cab3fdb6bfa32ee41e135f1815c7f19260c01f8679bb861c2694df2cda4f5684eef3cd1972101a7c36f790380360b37f29a53be82479

  • SSDEEP

    1536:PzZs7PhDgPV3M52jU/jW1/jLbfLoLsEcgnY:1+JgPpM0LoLfcgnY

Malware Config

Signatures

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Renames itself 1 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Changes its process name 1 IoCs
  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/zermips.elf
    /tmp/zermips.elf
    1⤵
    • Modifies Watchdog functionality
    • Renames itself
    • Changes its process name
    • System Network Configuration Discovery
    PID:707

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads