Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    07-12-2024 12:02

General

  • Target

    bot.mips.elf

  • Size

    177KB

  • MD5

    4ad148703b46bdb76791128c01180e52

  • SHA1

    be40b4e7d1c2b38d48252ac886573824a051731a

  • SHA256

    de3f739303636fe0c66b19b7b1e4c177397a789a2a646e73a86b303d5ac65b35

  • SHA512

    ec0c151ff89381515c99108da9e85d61a2092ac06c75c778fede6deeb86b8e2fd5fcb306502ea5e6d88e56c5166c19ebc8d8ec9bbe429053e17fa68cc69aeac5

  • SSDEEP

    3072:v6uSXvJnzjP0jW0zpyi579Yxy52tIen9A6qewZQ90n8:v6uSXvJnvP060z4igAEnfqnZ+08

Score
6/10

Malware Config

Signatures

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/bot.mips.elf
    /tmp/bot.mips.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    • System Network Configuration Discovery
    PID:705

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads