Analysis
-
max time kernel
120s -
max time network
154s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
11-12-2024 03:52
Behavioral task
behavioral1
Sample
fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf
-
Size
252KB
-
MD5
ba859a4911df1d2a7268e39726723faa
-
SHA1
02bf2b506d6f5cfc370ce4589dfcefb6d82a311a
-
SHA256
fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38
-
SHA512
ede0b2279d269c02d6e211dca653bc3a691f3603f44a758ea31a04093d6e49fe2ebb9e4d32c5adbe88f6d69c213fd24c57a8135b820bd9ed754c27d1a84fb74a
-
SSDEEP
6144:lxiy2m8siLgu2MJJyiZ2QcCa6PgwRZd9+:KNgaZThd9+
Malware Config
Signatures
-
Contacts a large (118828) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 694 sh 706 chmod -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf File opened for modification /dev/misc/watchdog fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/systemd 692 fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf -
description ioc Process File opened for reading /proc/filesystems mv File opened for reading /proc/self/maps fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf File opened for reading /proc/filesystems mkdir -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/systemd sh
Processes
-
/tmp/fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf/tmp/fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf1⤵
- Modifies Watchdog functionality
- Changes its process name
- Reads runtime system information
PID:692 -
/bin/shsh -c "rm -rf bin/systemd && mkdir bin; >bin/systemd && mv /tmp/fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf bin/systemd; chmod 777 bin/systemd"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:694 -
/bin/rmrm -rf bin/systemd3⤵PID:696
-
-
/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:698
-
-
/bin/mvmv /tmp/fe9cb775282756fc89cb3a58c58b5540f9083f887425868c5f5c27bcb897ec38.elf bin/systemd3⤵
- Reads runtime system information
PID:703
-
-
/bin/chmodchmod 777 bin/systemd3⤵
- File and Directory Permissions Modification
PID:706
-
-