Analysis

  • max time kernel
    100s
  • max time network
    154s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    09/03/2025, 15:00

General

  • Target

    u.elf

  • Size

    98KB

  • MD5

    27db76b11a2dd908b43b6bf593c3ceb2

  • SHA1

    34824414f2e10c6c205dbf48ccc5d672f62f637d

  • SHA256

    369d034487ed7915c55fd654c6847e29c8ab18afa7556654ea636fd30c7d8e34

  • SHA512

    3ce52cf707e4aef3ff94cbb3d7cfef242c969c0e3039c7be95f7c8c8d09c13493ea78a05ea7e37e5e092dead46b0fba5ede4884ffb591b9e2cb54418695099bc

  • SSDEEP

    3072:DlLyCZxUAkmkgCPpkblLs41V91zUOaUTPETuYCq:pGe5kgQiRV91zUOaUTPEEq

Score
9/10

Malware Config

Signatures

  • Contacts a large (128633) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Changes its process name 1 IoCs
  • Writes file to tmp directory 4 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/u.elf
    /tmp/u.elf
    1⤵
    • Changes its process name
    • Writes file to tmp directory
    PID:706

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads