Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    13-12-2024 09:19

General

  • Target

    zmap.mips.elf

  • Size

    94KB

  • MD5

    d377e3c092cbb6844b829eb906986c27

  • SHA1

    37b7e9ff0ca35fb0ba47717e542c056a9999a7d2

  • SHA256

    5ae3ad197ce2439a589c5658203c9b7d91a335b3b37f6e74b63a56be6a4746ad

  • SHA512

    2d247af54b094a28dafc2d8791df6de02e32783e07a1b8a214c827196ae4c9c8cff75119ae58cf5aa9829ba0488a15b6342219fe3c289b13cbac68411ca4b2b1

  • SSDEEP

    1536:mF4tsbv54o+3bPhXhWxZJi0YduAL+fyecpeo6X7Lty:mF4tsr54o+rPhkxi0YdbL+fyecIX7LY

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 2 IoCs
  • Changes its process name 1 IoCs
  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/zmap.mips.elf
    /tmp/zmap.mips.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Writes file to system bin folder
    • Changes its process name
    • System Network Configuration Discovery
    PID:719

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads