General

  • Target

    Winbox.mips

  • Size

    61KB

  • Sample

    210508-j8hmw3pgya

  • MD5

    9545bf0b5b4eaf6d29dfb1adbf58ed97

  • SHA1

    36192680708568942871d434a4b3a26057bbaffa

  • SHA256

    ed776a70e2eb9f96d65e7d98cb2ea67c1cc6f4e100530a3f4b3109750f4a8f62

  • SHA512

    5830385aa6a7499f7683be156139cd4ef910e21dead3d88d35c47f4e2582cffd9d009def5a79793d98bd96a25dc03e5d156573bb216fac4a7bbc147421b2625c

Score
9/10

Malware Config

Targets

    • Target

      Winbox.mips

    • Size

      61KB

    • MD5

      9545bf0b5b4eaf6d29dfb1adbf58ed97

    • SHA1

      36192680708568942871d434a4b3a26057bbaffa

    • SHA256

      ed776a70e2eb9f96d65e7d98cb2ea67c1cc6f4e100530a3f4b3109750f4a8f62

    • SHA512

      5830385aa6a7499f7683be156139cd4ef910e21dead3d88d35c47f4e2582cffd9d009def5a79793d98bd96a25dc03e5d156573bb216fac4a7bbc147421b2625c

    Score
    9/10
    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Impair Defenses

1
T1562

Discovery

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks