Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    27-11-2024 21:37

General

  • Target

    bot.mips.elf

  • Size

    177KB

  • MD5

    dba784f52b7372262abca621b2dcda12

  • SHA1

    0ff299d2e65fe4d20b16153f249a7f3e6250d7d0

  • SHA256

    76529ff2f65f4aef14a2140ec8babb941cda6b6ad0d6696f1bbc48ffa1a598f6

  • SHA512

    cc6694f986cd025dc29ce98f94187f15f3095d212ce2ce46833cac2179075fcf9e9443cf4f8082d4dfb13154f62e5ef326c47936c812f5661cd6325f1f5986bd

  • SSDEEP

    3072:Xaup+PqlzjRmWb/gBtQL/SrYbmFl4R44bOQy2P:Xaup+PqlvRmWbI4ilFg4eOl4

Score
6/10

Malware Config

Signatures

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/bot.mips.elf
    /tmp/bot.mips.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    • System Network Configuration Discovery
    PID:709

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads