Analysis
-
max time kernel
100s -
max time network
154s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
09/03/2025, 15:00
Behavioral task
behavioral1
Sample
u.elf
Resource
debian9-mipsbe-20240611-en
General
-
Target
u.elf
-
Size
98KB
-
MD5
27db76b11a2dd908b43b6bf593c3ceb2
-
SHA1
34824414f2e10c6c205dbf48ccc5d672f62f637d
-
SHA256
369d034487ed7915c55fd654c6847e29c8ab18afa7556654ea636fd30c7d8e34
-
SHA512
3ce52cf707e4aef3ff94cbb3d7cfef242c969c0e3039c7be95f7c8c8d09c13493ea78a05ea7e37e5e092dead46b0fba5ede4884ffb591b9e2cb54418695099bc
-
SSDEEP
3072:DlLyCZxUAkmkgCPpkblLs41V91zUOaUTPETuYCq:pGe5kgQiRV91zUOaUTPEEq
Malware Config
Signatures
-
Contacts a large (128633) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 74.74.74.40 -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself vgdjhtpk~}wx`bjzv 706 u.elf -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/=vwd=TFEVF#"#N2esfqzv}u u.elf File opened for modification /tmp/=vwd=esfqzv}u u.elf File opened for modification /tmp/=vwd={aq=esfqzv}u u.elf File opened for modification /tmp/=vwd=TFEVF#"#Mesfqzv}u u.elf