Analysis
-
max time kernel
149s -
max time network
152s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240729-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
24/03/2025, 11:26
Behavioral task
behavioral1
Sample
g4za.mips.elf
Resource
debian9-mipsbe-20240729-en
General
-
Target
g4za.mips.elf
-
Size
106KB
-
MD5
de57dd44247f891ff0419d0678c14c08
-
SHA1
fa23acde6f9e029c295b195fc253cbf505c7a7e9
-
SHA256
301b58ae229d7e9e0be0363b81571f0704c9abd67738f0524ed69d52b1fff2eb
-
SHA512
cc004d9767c6847a871d7d54fa35c48e9bbaff57e17b2c81331785c3bc2614e42a8f3ee1d780341c303524318b8c060bfe75e0675cb1005e57bd6714a67e77ec
-
SSDEEP
3072:7gSfmqSBUF8kipNeRFGZNN47E17m86FnTPOvhu:dmqSBUF8kipcaNN47E17m8ET8hu
Malware Config
Signatures
-
Contacts a large (125383) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog g4za.mips.elf File opened for modification /dev/misc/watchdog g4za.mips.elf -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp g4za.mips.elf -
Reads process memory 1 TTPs 22 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/690/maps g4za.mips.elf File opened for reading /proc/691/maps g4za.mips.elf File opened for reading /proc/728/maps g4za.mips.elf File opened for reading /proc/740/maps g4za.mips.elf File opened for reading /proc/807/maps g4za.mips.elf File opened for reading /proc/817/maps g4za.mips.elf File opened for reading /proc/684/maps g4za.mips.elf File opened for reading /proc/722/maps g4za.mips.elf File opened for reading /proc/733/maps g4za.mips.elf File opened for reading /proc/836/maps g4za.mips.elf File opened for reading /proc/448/maps g4za.mips.elf File opened for reading /proc/688/maps g4za.mips.elf File opened for reading /proc/709/maps g4za.mips.elf File opened for reading /proc/729/maps g4za.mips.elf File opened for reading /proc/795/maps g4za.mips.elf File opened for reading /proc/818/maps g4za.mips.elf File opened for reading /proc/727/maps g4za.mips.elf File opened for reading /proc/731/maps g4za.mips.elf File opened for reading /proc/734/maps g4za.mips.elf File opened for reading /proc/791/maps g4za.mips.elf File opened for reading /proc/803/maps g4za.mips.elf File opened for reading /proc/829/maps g4za.mips.elf -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself gtwj3i8jo7fd0v74 730 g4za.mips.elf -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp g4za.mips.elf -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 730 g4za.mips.elf