Analysis

  • max time kernel
    134s
  • max time network
    154s
  • platform
    debian-12_mipsel
  • resource
    debian12-mipsel-20250410-en
  • resource tags

    arch:mipselimage:debian12-mipsel-20250410-enkernel:6.1.0-17-4kc-maltalocale:en-usos:debian-12-mipselsystem
  • submitted
    13/04/2025, 01:53

General

  • Target

    3e57c18d02b60bcabf7c533668c9515396d86874464d609f230d28635fa7fcba.elf

  • Size

    78KB

  • MD5

    ea2acd44174bf878b3ea7340599e5ec7

  • SHA1

    d01f2ae0b6332b4e1de6c70fd343184569e42cab

  • SHA256

    3e57c18d02b60bcabf7c533668c9515396d86874464d609f230d28635fa7fcba

  • SHA512

    da919e091b72e6fe17fb269029ef4707926446f1287eb9f21c323721c5708cfd35fd1b66c3d0c7d6ac809e47d0a55fd13335b2bda1367250baf3d216a90dadcc

  • SSDEEP

    1536:8Vu0vLwRoSXtGRm1FoR62xk3MDuPS8pyIzBTa:8c0vLwR5ttoR62xMyIa

Malware Config

Signatures

  • Contacts a large (19990) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes itself 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Changes its process name 1 IoCs
  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

Processes

  • /tmp/3e57c18d02b60bcabf7c533668c9515396d86874464d609f230d28635fa7fcba.elf
    /tmp/3e57c18d02b60bcabf7c533668c9515396d86874464d609f230d28635fa7fcba.elf
    1⤵
    • Deletes itself
    • Modifies Watchdog functionality
    • Enumerates active TCP sockets
    • Changes its process name
    • Reads system network configuration
    PID:788

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads