Analysis
-
max time kernel
150s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
30-12-2024 02:26
Behavioral task
behavioral1
Sample
842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf
Resource
debian9-mipsbe-20240418-en
General
-
Target
842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf
-
Size
99KB
-
MD5
e96e55c5a8ffad62537f7478dc0c0108
-
SHA1
fc36d6db78608f6b838cbbb03df294c3a6c4c43f
-
SHA256
842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff
-
SHA512
15df1b198a91a3628494e53ca4a031f4492d24793980d1828d12bf3f156013d6eb4d9c54584701341f8efcbb4c613f03b30d5d646c098ef377c6cb15aaacce1b
-
SSDEEP
1536:pegXznytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GBxd9:jiDEA0WKbNx3XK7wYv1jaiB/9
Malware Config
Signatures
-
Contacts a large (20464) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for modification /dev/misc/watchdog 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf -
description ioc Process File opened for reading /proc/330/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/355/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/246/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/376/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/712/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/702/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/719/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/791/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/354/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/715/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/687/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/1/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/665/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/669/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/671/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/672/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/150/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/383/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/783/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/707/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/709/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/171/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/375/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/708/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/779/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/329/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/356/fd 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/424/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf File opened for reading /proc/735/exe 842c5aa3d5f89619982040c7b219b5bd94747795429944eca74c95cc51ac09ff.elf