Resubmissions

13-05-2022 13:18

220513-qjy8rsafdp 10

13-05-2022 13:05

220513-qbhaaaffe2 10

12-05-2022 08:46

220512-kpla7sbfe7 10

11-05-2022 15:07

220511-shdxjsahh5 10

General

  • Target

    mozi.a

  • Size

    300KB

  • Sample

    220513-qbhaaaffe2

  • MD5

    eec5c6c219535fba3a0492ea8118b397

  • SHA1

    292559e94f1c04b7d0c65d4a01bbbc5dc1ff6f21

  • SHA256

    12013662c71da69de977c04cd7021f13a70cf7bed4ca6c82acbc100464d4b0ef

  • SHA512

    3482c8324a18302f0f37b6e23ed85f24fff9f50bb568d8fd7461bf57f077a7c592f7a88bb2e1c398699958946d87bb93ab744d13a0003f9b879c15e6471f7400

Malware Config

Targets

    • Target

      mozi.a

    • Size

      300KB

    • MD5

      eec5c6c219535fba3a0492ea8118b397

    • SHA1

      292559e94f1c04b7d0c65d4a01bbbc5dc1ff6f21

    • SHA256

      12013662c71da69de977c04cd7021f13a70cf7bed4ca6c82acbc100464d4b0ef

    • SHA512

      3482c8324a18302f0f37b6e23ed85f24fff9f50bb568d8fd7461bf57f077a7c592f7a88bb2e1c398699958946d87bb93ab744d13a0003f9b879c15e6471f7400

    • suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

      suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

    • suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

      suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

    • Contacts a large (27472) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • Writes DNS configuration

      Writes data to DNS resolver config file.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks