Description
This may indicate a network scan to discover remotely running services.
Mozi.mzbmdlgir
132KB
220425-3pq6kahcg2
59ce0baba11893f90527fc951ac69912
5857a7dd621c4c3ebb0b5a3bec915d409f70d39f
4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7
c5b12797b477e5e5964a78766bb40b1c0d9fdfb8eef1f9aee3df451e3441a40c61d325bf400ba51048811b68e1c70a95f15e4166b7a65a4eca0c624864328647
Mozi.mzbmdlgir
59ce0baba11893f90527fc951ac69912
132KB
5857a7dd621c4c3ebb0b5a3bec915d409f70d39f
4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7
c5b12797b477e5e5964a78766bb40b1c0d9fdfb8eef1f9aee3df451e3441a40c61d325bf400ba51048811b68e1c70a95f15e4166b7a65a4eca0c624864328647
This may indicate a network scan to discover remotely running services.
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
Adds to hosts file used for mapping hosts to IP addresses.
Writes data to DNS resolver config file.
Gets active TCP sockets from /proc virtual filesystem.
Adds/modifies system service, likely for persistence.
Gets active network interfaces from /proc virtual filesystem.
This may indicate a network scan to discover remotely running services.
Uses a legitimate IP lookup service to find the infected system's external IP.
Uses contents of /proc filesystem to enumerate network settings.
Reads data from /proc virtual filesystem.
Malware often drops required files in the /tmp directory.