Analysis
-
max time kernel
152s -
max time network
165s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
14-12-2024 02:17
Behavioral task
behavioral1
Sample
1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf
Resource
debian12-mipsel-20240221-en
General
-
Target
1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf
-
Size
94KB
-
MD5
04b0ce1124a63fd41bb394ba5d6e771a
-
SHA1
ff872de5221a319cecca7bff9e699a67f1af6f32
-
SHA256
1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad
-
SHA512
41d2a5c6c2a8e8360ac19499154323e268f68fc1015a927fd38ff42f692696a3e347d705b4444287647826a572091dd16f944190e536bc38e3ea2c92e99b5915
-
SSDEEP
1536:tifuxWZfMCV8SerqEbYJJSw1J2V4J+aIZRIdD3Bf/wbZnsRp:t9xWaCNlr2VQ+HCx/wbZnsR
Malware Config
Signatures
-
Contacts a large (19689) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 734 sh 748 chmod -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 76.236.240.52 Destination IP 76.236.240.52 -
Modifies rc script 2 TTPs 1 IoCs
Adding/modifying system rc scripts is a common persistence mechanism.
description ioc Process File opened for modification /etc/rc.local 1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself /bin/busybox 732 1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf -
description ioc Process File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mv -
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/bin/busybox sh
Processes
-
/tmp/1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf/tmp/1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf1⤵
- Modifies rc script
- Changes its process name
PID:732 -
/bin/shsh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf bin/busybox; chmod 777 bin/busybox"2⤵
- File and Directory Permissions Modification
- Writes file to tmp directory
PID:734 -
/usr/bin/rmrm -rf bin/busybox3⤵PID:736
-
-
/usr/bin/mkdirmkdir bin3⤵
- Reads runtime system information
PID:738
-
-
/usr/bin/mvmv /tmp/1a698a7548e186155ad9802aa85952527bb0a1ab772462ee5b031de63f2f8aad.elf bin/busybox3⤵
- Reads runtime system information
PID:742
-
-
/usr/bin/chmodchmod 777 bin/busybox3⤵
- File and Directory Permissions Modification
PID:748
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5693b25352a9477882662df0d08eac50c
SHA11af94224492224d7a136fd8c5f769a8af7e55b68
SHA256df474ba7a706f81221a7ef57df00a94c47676c481dc1a689e8df80451aa05e06
SHA5124ebf9251bcdb6cf694e69ecec3ab669e30afe5fa14af4a80db0b44bf05264a336a6292302955c044ed299a8085fea3163c7d7bbb27e03ddd3c49e213e2b3721d