Analysis
-
max time kernel
73s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
29-12-2024 18:47
Behavioral task
behavioral1
Sample
mips.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
mips.elf
-
Size
139KB
-
MD5
76eb5da6b6f168847d7bb611093134bf
-
SHA1
7e9b7d688ea2817731f2021a683d7dd73475688f
-
SHA256
3a890af148ebca93bf4df29e95edb3e6a0c60f924124cb0bac553cd024bfe420
-
SHA512
16b65707969b75831d584097e0a14a119ef974e1ab153561d83d44ef192a47b6f9bdbd0cd60442a387db1dcdb25646bb2a86a305074c01bbc961910f26888fa8
-
SSDEEP
3072:XIqKwz8TMTlaxy0lMyQIu5uDW1YjAHV7kp0D/:9oclaxBbQIC8RMupu/
Malware Config
Signatures
-
Contacts a large (48926) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog mips.elf File opened for modification /dev/misc/watchdog mips.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp mips.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself uuhoSBHywCsYhqRJmoK 706 mips.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp mips.elf -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 706 mips.elf