Analysis
-
max time kernel
63s -
max time network
154s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240418-en -
resource tags
arch:mipselimage:debian12-mipsel-20240418-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
04-12-2024 18:48
Behavioral task
behavioral1
Sample
mipsel.elf
Resource
debian12-mipsel-20240418-en
General
-
Target
mipsel.elf
-
Size
199KB
-
MD5
13e1a4d77e5fb05097f77734848bbdb4
-
SHA1
2941650f51d3a5ffb0f2a6a651823e31c5a32f46
-
SHA256
cb3d517ee9d8cf801e226da7f54fee49491e774fd8287d49e6a2def85d3a81e8
-
SHA512
131b423be23a4ca3dfd5728cc644f892a2bef374fdc41e1e762f29aeb32bd00060537c35664a5fc39fbd39dd1e123628a4e36a504b69e5e7aeb97fa322b18ce8
-
SSDEEP
3072:ooIR900aTESn9teFTmlaIW9OHDDTlPWDyaejZh:oowVSeFTm0wDDTlPWDyaejZh
Malware Config
Signatures
-
Contacts a large (70680) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog mipsel.elf File opened for modification /dev/watchdog mipsel.elf -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/route mipsel.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /usr/sbin/dropbear 741 mipsel.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/route mipsel.elf -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 741 mipsel.elf