General
-
Target
i
-
Size
129KB
-
Sample
210218-1nted2letj
-
MD5
dbc520ea1518748fec9fcfcf29755c30
-
SHA1
0a427f86b4360fb603c6e3c5878c9be7ced59adc
-
SHA256
c672798dca67f796972b42ad0c89e25d589d2e70eb41892d26adbb6a79f63887
-
SHA512
6d42025c8c4b1778de583fb4468da72750e8d6022f24e1e8c5cd6b1ff853eb2cdeb9de75338e37da729be2576a7e8e8aa3cdf184b1a9f6b27b6169e23d724055
Static task
static1
Behavioral task
behavioral1
Sample
i
Resource
ubuntu-amd64
Behavioral task
behavioral2
Sample
i
Resource
debian9-mipsel
Behavioral task
behavioral3
Sample
i
Resource
debian9-mipsbe
Malware Config
Targets
-
-
Target
i
-
Size
129KB
-
MD5
dbc520ea1518748fec9fcfcf29755c30
-
SHA1
0a427f86b4360fb603c6e3c5878c9be7ced59adc
-
SHA256
c672798dca67f796972b42ad0c89e25d589d2e70eb41892d26adbb6a79f63887
-
SHA512
6d42025c8c4b1778de583fb4468da72750e8d6022f24e1e8c5cd6b1ff853eb2cdeb9de75338e37da729be2576a7e8e8aa3cdf184b1a9f6b27b6169e23d724055
Score9/10-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-
Modifies hosts file
Adds to hosts file used for mapping hosts to IP addresses.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-
Reads system network configuration
Uses contents of /proc filesystem to enumerate network settings.
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-