General

  • Target

    015759d200dfc443b8c16715a501801e66bf65314f36eae74dfecd2c503e7665

  • Size

    209KB

  • Sample

    220521-p1wcrsgdb6

  • MD5

    8cd570dfa348a0e243d912f6ba351bb5

  • SHA1

    e9e361df20413cffcaf6d87dc28f2c53fc9b4476

  • SHA256

    015759d200dfc443b8c16715a501801e66bf65314f36eae74dfecd2c503e7665

  • SHA512

    5003d9a78931f4840b95b18d7248ae9fe6333906b8b31b6c2a6dee34726b3fe0bdd5f618619073c9684231bae6a9554797aef20d2ffa7cfd68596015149f38a5

Score
10/10

Malware Config

Targets

    • Target

      015759d200dfc443b8c16715a501801e66bf65314f36eae74dfecd2c503e7665

    • Size

      209KB

    • MD5

      8cd570dfa348a0e243d912f6ba351bb5

    • SHA1

      e9e361df20413cffcaf6d87dc28f2c53fc9b4476

    • SHA256

      015759d200dfc443b8c16715a501801e66bf65314f36eae74dfecd2c503e7665

    • SHA512

      5003d9a78931f4840b95b18d7248ae9fe6333906b8b31b6c2a6dee34726b3fe0bdd5f618619073c9684231bae6a9554797aef20d2ffa7cfd68596015149f38a5

    Score
    9/10
    • Contacts a large (58670) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Scanning

2
T1046

System Network Configuration Discovery

2
T1016

Tasks