Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
27-12-2024 11:18
Behavioral task
behavioral1
Sample
712-1-0x00400000-0x0045aba8-memory.dmp
Resource
debian9-mipsbe-20240729-en
General
-
Target
712-1-0x00400000-0x0045aba8-memory.dmp
-
Size
105KB
-
MD5
941b64f05daf9aee781500b88ab85570
-
SHA1
80aa198783d3f58ab38c2235c90fcd6141195230
-
SHA256
64ea6326c8a852858317ca173bbe5ce52fbd2258f1b150d4d4d8d5cb0ef4e870
-
SHA512
3af20c077826d51a66d01f9207e7c188bd8f7276d01b2cb6dc4bd3376c7d1175c5a456583eee68efebdfe5dcd30e097d72a0794b66d11ccdf832419f976ed4e8
-
SSDEEP
1536:ZBtIUODpEJqMVg0ECa2RdX1X0Wr/Lenr2TtbV+HgD/zl/OEfnVTldzwj6I:ZMhtEAGhECau50Wrbr+Hgrzl/OEfnBq
Malware Config
Signatures
-
Contacts a large (201179) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 712-1-0x00400000-0x0045aba8-memory.dmp File opened for modification /dev/misc/watchdog 712-1-0x00400000-0x0045aba8-memory.dmp -
Writes file to system bin folder 2 IoCs
description ioc Process File opened for modification /sbin/watchdog 712-1-0x00400000-0x0045aba8-memory.dmp File opened for modification /bin/watchdog 712-1-0x00400000-0x0045aba8-memory.dmp -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 712 712-1-0x00400000-0x0045aba8-memory.dmp -
description ioc Process File opened for reading /proc/717/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/718/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/721/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/780/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/803/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/675/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/679/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/710/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/722/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/754/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/678/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/708/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/709/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/715/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/716/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/783/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/788/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/802/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/704/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/685/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/686/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/703/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/753/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/776/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/784/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp File opened for reading /proc/437/cmdline 712-1-0x00400000-0x0045aba8-memory.dmp