Analysis
-
max time kernel
144s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240611-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
28/03/2025, 00:28
Behavioral task
behavioral1
Sample
g4za.mips
Resource
debian9-mipsbe-20240611-en
General
-
Target
g4za.mips
-
Size
106KB
-
MD5
de57dd44247f891ff0419d0678c14c08
-
SHA1
fa23acde6f9e029c295b195fc253cbf505c7a7e9
-
SHA256
301b58ae229d7e9e0be0363b81571f0704c9abd67738f0524ed69d52b1fff2eb
-
SHA512
cc004d9767c6847a871d7d54fa35c48e9bbaff57e17b2c81331785c3bc2614e42a8f3ee1d780341c303524318b8c060bfe75e0675cb1005e57bd6714a67e77ec
-
SSDEEP
3072:7gSfmqSBUF8kipNeRFGZNN47E17m86FnTPOvhu:dmqSBUF8kipcaNN47E17m8ET8hu
Malware Config
Signatures
-
Contacts a large (126141) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc Process File opened for modification /dev/watchdog g4za.mips File opened for modification /dev/misc/watchdog g4za.mips -
Enumerates active TCP sockets 1 TTPs 1 IoCs
Gets active TCP sockets from /proc virtual filesystem.
description ioc Process File opened for reading /proc/net/tcp g4za.mips -
Reads process memory 1 TTPs 19 IoCs
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
description ioc Process File opened for reading /proc/673/maps g4za.mips File opened for reading /proc/685/maps g4za.mips File opened for reading /proc/700/maps g4za.mips File opened for reading /proc/706/maps g4za.mips File opened for reading /proc/769/maps g4za.mips File opened for reading /proc/791/maps g4za.mips File opened for reading /proc/695/maps g4za.mips File opened for reading /proc/702/maps g4za.mips File opened for reading /proc/704/maps g4za.mips File opened for reading /proc/709/maps g4za.mips File opened for reading /proc/777/maps g4za.mips File opened for reading /proc/412/maps g4za.mips File opened for reading /proc/680/maps g4za.mips File opened for reading /proc/669/maps g4za.mips File opened for reading /proc/681/maps g4za.mips File opened for reading /proc/701/maps g4za.mips File opened for reading /proc/707/maps g4za.mips File opened for reading /proc/765/maps g4za.mips File opened for reading /proc/665/maps g4za.mips -
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself dslqalsrputq3tqi 703 g4za.mips -
Reads system network configuration 1 TTPs 1 IoCs
Uses contents of /proc filesystem to enumerate network settings.
description ioc Process File opened for reading /proc/net/tcp g4za.mips -
System Network Configuration Discovery 1 TTPs 1 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 703 g4za.mips