General
-
Target
meihao.mpsl
-
Size
32KB
-
Sample
220512-bk3v1sfea3
-
MD5
9277f8eec840075eb67286576e0ad0b3
-
SHA1
e44c3ba26585258cae0b36c782072aaa8d7276f6
-
SHA256
c6f16fddf7e3bd6af6e13fd337d7037bd65b7e4caee9148710b2513e477d6748
-
SHA512
cc64d9521d1e418980e04056c8d88d3196c51acc7c96bae95a011f8c9f05068a37a769b18fed2046933d1acd298c32f64134d3bc89c75c97d7f23d88e7995bad
Static task
static1
Malware Config
Targets
-
-
Target
meihao.mpsl
-
Size
32KB
-
MD5
9277f8eec840075eb67286576e0ad0b3
-
SHA1
e44c3ba26585258cae0b36c782072aaa8d7276f6
-
SHA256
c6f16fddf7e3bd6af6e13fd337d7037bd65b7e4caee9148710b2513e477d6748
-
SHA512
cc64d9521d1e418980e04056c8d88d3196c51acc7c96bae95a011f8c9f05068a37a769b18fed2046933d1acd298c32f64134d3bc89c75c97d7f23d88e7995bad
-
suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution
suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution
-
suricata: ET MALWARE Mirai Variant User-Agent (Outbound)
suricata: ET MALWARE Mirai Variant User-Agent (Outbound)
-
Contacts a large (238011) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-