Analysis
-
max time kernel
113s -
max time network
163s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
11-12-2024 02:30
Behavioral task
behavioral1
Sample
451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf
Resource
debian12-mipsel-20240221-en
General
-
Target
451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf
-
Size
253KB
-
MD5
663ac1bdb34abacde4a22fc79864e968
-
SHA1
5772847c44e6d5d560c6a89595fd621ced0c9e1d
-
SHA256
451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57
-
SHA512
4cf9b5d8ff009018451cfecb98e6c28e217a9969cc1a29024da16d157af3658b777c3ac66ec162decb629d7b270d069122a981be1144261668541c9800738344
-
SSDEEP
3072:KQI6B2S63X5wy/gFTp6bD9faWpV25qyphC6SCemnrtZmIqwbZnM:K96B2S63pwyHyCIhC/sriHwRM
Malware Config
Signatures
-
Contacts a large (118995) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 745 sh 760 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog 451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf File opened for modification /dev/watchdog 451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 743 451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps 451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf/tmp/451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:743 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:745 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:747
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:750
-
-
/usr/bin/mvmv /tmp/451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57.elf bin/busybox3⤵
- Reads runtime system information
PID:754
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:760
-
-