General
-
Target
fc89b9fc870edd95491a1df4973a7459d41ab776db64f40688327a3df1decde3
-
Size
74KB
-
Sample
220521-p4frgsbgel
-
MD5
c4b72084567f849d0b3b1e276600e653
-
SHA1
5da351e887fa1501eb72345ede495458e7038890
-
SHA256
fc89b9fc870edd95491a1df4973a7459d41ab776db64f40688327a3df1decde3
-
SHA512
036187aa97c82593fb0e09db4760a3645085df6c9b655e57c4dd742a6627fefa5051fe6c784aab9a41e689c372cb826f4ae1cb543bf60b7767842a7ae7170f77
Static task
static1
Malware Config
Targets
-
-
Target
fc89b9fc870edd95491a1df4973a7459d41ab776db64f40688327a3df1decde3
-
Size
74KB
-
MD5
c4b72084567f849d0b3b1e276600e653
-
SHA1
5da351e887fa1501eb72345ede495458e7038890
-
SHA256
fc89b9fc870edd95491a1df4973a7459d41ab776db64f40688327a3df1decde3
-
SHA512
036187aa97c82593fb0e09db4760a3645085df6c9b655e57c4dd742a6627fefa5051fe6c784aab9a41e689c372cb826f4ae1cb543bf60b7767842a7ae7170f77
-
suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution
suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution
-
suricata: ET MALWARE Mirai Variant User-Agent (Outbound)
suricata: ET MALWARE Mirai Variant User-Agent (Outbound)
-
Contacts a large (67825) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Reads system network configuration
Uses contents of /proc filesystem to enumerate network settings.
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-