Analysis
-
max time kernel
150s -
max time network
154s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240226-en -
resource tags
arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
01/12/2024, 02:59
Behavioral task
behavioral1
Sample
c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf
Resource
debian9-mipsel-20240226-en
General
-
Target
c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf
-
Size
94KB
-
MD5
fcb0ebdc1f6fe1706eaaad021da20c90
-
SHA1
6872f6601e2efc1a3c648b14506f1e93bcb00b2f
-
SHA256
c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e
-
SHA512
15cd2cc133c0d48a95d52fa0011e2c04294941afe29630aa10c26bdcf1325453f321941661878f1517bb2474e5b898e42ee7c21e21e75fd90ed102779b4e5a7c
-
SSDEEP
1536:MFAKh0ivvOiTH7BaOJO9rw0jCxPchgLIyIJcLqZO2v/7XlWmPS:aAKh0ivvOiTH7Baz9cvLqBXlWwS
Malware Config
Signatures
-
Contacts a large (20271) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for modification /dev/misc/watchdog c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf -
description ioc Process File opened for reading /proc/771/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/401/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/711/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/704/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/705/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/720/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/738/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/472/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/486/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/706/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/716/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/775/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/783/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/685/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/808/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/708/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/513/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/514/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/699/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf File opened for reading /proc/700/exe c75df4c69b181d2b2e79f4c10551d3aee2b2662871220e5ef8670766aa75fa6e.elf