Analysis
-
max time kernel
64s -
max time network
165s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
03-01-2025 01:45
Behavioral task
behavioral1
Sample
e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf
Resource
debian12-mipsel-20240221-en
General
-
Target
e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf
-
Size
106KB
-
MD5
ea32efb911185778be600ecedbe2ddbb
-
SHA1
8c73f43408256526beba33215be7845798b63910
-
SHA256
e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251
-
SHA512
a12f54044e22298d96310560186e517041a338ba4719a038ec48cc2bbc6ca34166a774534d6cdb5019213528c7016d8df63b650a108d0197692fafcc3638901c
-
SSDEEP
1536:iAX2gnezXPlAGhpwC4S9P2uI+yXVJZPTnZSu3aCwmj9+:ia2gnezXPllh0lJlTnOE9
Malware Config
Signatures
-
description ioc Process File deleted /var/log/audit/audit.log e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf -
Deletes itself 1 IoCs
pid Process 740 e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf -
description ioc Process File deleted /var/log/journal/edeb2f80f756429c9aae366fe5ab23dd/system.journal e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/misc/watchdog e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for modification /dev/watchdog e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf -
description ioc Process File deleted /var/log/lastlog e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File deleted /var/log/wtmp e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd 2 TTPs 1 IoCs
Adds/ modifies systemd service files. Likely to achieve persistence.
description ioc Process File opened for modification /etc/systemd/system/startup_command.service e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself jcc61v8mn6rnun1d1vho8ud6b618 740 e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf -
description ioc Process File opened for reading /proc/17/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/115/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/138/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/752/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/758/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/886/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/4/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/403/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/759/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/847/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/921/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/931/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/16/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/19/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/599/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/772/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/895/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/3/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/732/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/782/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/829/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/24/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/137/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/949/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/957/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/986/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/1015/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/1088/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/779/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/13/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/20/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/25/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/203/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/736/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/745/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/771/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/781/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/802/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/1029/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/718/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/763/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/780/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/797/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/812/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/830/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/6/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/734/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/852/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/920/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/1025/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/1042/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/10/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/26/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/406/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/749/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/775/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/793/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/864/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/21/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/47/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/768/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/1047/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/411/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf File opened for reading /proc/419/cmdline e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf
Processes
-
/tmp/e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf/tmp/e1245fe7825242a19c87b04b3bb3c4d20c8562df664a881508b4268309108251.elf1⤵
- Deletes Audit logs
- Deletes itself
- Deletes journal logs
- Modifies Watchdog functionality
- Deletes log files
- Modifies systemd
- Changes its process name
- Reads runtime system information
PID:740 -
/bin/shsh -c "systemctl daemon-reload"2⤵PID:748
-
/usr/bin/systemctlsystemctl daemon-reload3⤵PID:750
-
-
-
/bin/shsh -c "systemctl enable startup_command.service"2⤵PID:861
-
/usr/bin/systemctlsystemctl enable startup_command.service3⤵PID:864
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Privilege Escalation
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361B
MD54d2c868f454b6c55731485cf0f886dc0
SHA1032b125de0a28dcee8d8d25fbeeb56db7f403f04
SHA2568c4ae1b82477698f3a8c273b439cb9079794afb8fc33cd4def854936ba37ea2c
SHA512060b2413a0cb2dec0db059c190467b5cb0d76209effea4ae3de2701fa71429b811a6f7e11e813b26806cf72578d1f32b608a02a4ce670ec58b5b65433e3cf11d