General

  • Target

    meihao.mpsl

  • Size

    32KB

  • Sample

    220512-bk3v1sfea3

  • MD5

    9277f8eec840075eb67286576e0ad0b3

  • SHA1

    e44c3ba26585258cae0b36c782072aaa8d7276f6

  • SHA256

    c6f16fddf7e3bd6af6e13fd337d7037bd65b7e4caee9148710b2513e477d6748

  • SHA512

    cc64d9521d1e418980e04056c8d88d3196c51acc7c96bae95a011f8c9f05068a37a769b18fed2046933d1acd298c32f64134d3bc89c75c97d7f23d88e7995bad

Malware Config

Targets

    • Target

      meihao.mpsl

    • Size

      32KB

    • MD5

      9277f8eec840075eb67286576e0ad0b3

    • SHA1

      e44c3ba26585258cae0b36c782072aaa8d7276f6

    • SHA256

      c6f16fddf7e3bd6af6e13fd337d7037bd65b7e4caee9148710b2513e477d6748

    • SHA512

      cc64d9521d1e418980e04056c8d88d3196c51acc7c96bae95a011f8c9f05068a37a769b18fed2046933d1acd298c32f64134d3bc89c75c97d7f23d88e7995bad

    Score
    10/10
    • suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

      suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

    • suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

      suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

    • Contacts a large (238011) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Enterprise v6

Tasks