Analysis

  • max time kernel
    102s
  • max time network
    102s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240729-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    18-12-2024 19:30

General

  • Target

    bot.mips

  • Size

    177KB

  • MD5

    a4488c1707634e53e00322ce6e461beb

  • SHA1

    9426511d282db2a25a096f9f580bcb12a46e2b0b

  • SHA256

    a9cfe7dbdc25e540fae253b4246da912c800fa1e480e5378ed05b373154ef70b

  • SHA512

    97b1c392c11c824e973cce2497b22eb96cca99fbc1216566ed9427afc29a45b3e2b03490c4af37300a6d13718d218b3aaff38d9dbdc72e76cb2a0b093c41abdd

  • SSDEEP

    3072:f6uSXvJnzjP0jSazpyi579Yxy52tIen9A6qewZQDhaMh:f6uSXvJnvP0+azYigAEnfqnZ4haa

Score
6/10

Malware Config

Signatures

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Changes its process name 1 IoCs
  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 1 IoCs

    Adversaries may gather information about the network configuration of a system.

Processes

  • /tmp/bot.mips
    /tmp/bot.mips
    1⤵
    • Changes its process name
    • Reads runtime system information
    • System Network Configuration Discovery
    PID:738

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads