Analysis
-
max time kernel
153s -
max time network
166s -
platform
debian-12_mipsel -
resource
debian12-mipsel-20240221-en -
resource tags
arch:mipselimage:debian12-mipsel-20240221-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem -
submitted
02-02-2025 04:22
Behavioral task
behavioral1
Sample
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf
Resource
debian12-mipsel-20240221-en
General
-
Target
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf
-
Size
66KB
-
MD5
039223d2b7b6cccba603bb55ff1db3b9
-
SHA1
cd1984a0e2539416f0ae5e774c1b3fb2ab6b9421
-
SHA256
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0
-
SHA512
e0a7e833dcafa9adc72dc67e5951e87a6c953c5e32b9b0a118ce72338b5940d62ebcb166353300c9b2554b4584c1495419daba729f4f0e773be7648f13c3caaf
-
SSDEEP
768:P79+h7Kfbq19azhX6NpQsq/bxy2MB5/Qn5V5eIXezbevQYGzgi9XXirqwJklqIO:P794Kzq19uhwik2yonl9XibOQYGZ8kB
Malware Config
Signatures
-
Contacts a large (103450) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 738 5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog 5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf File opened for modification /dev/misc/watchdog 5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf -
Renames itself 1 IoCs
pid Process 738 5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 185.181.61.24 -
Changes its process name 1 IoCs
description pid Process Changes the process name, possibly in an attempt to hide itself 738 5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf