General

  • Target

    5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023

  • Size

    31KB

  • Sample

    220521-p6el7sgga8

  • MD5

    25e2f3770de67a52720c041f37defeca

  • SHA1

    952320907552081a5887570c155e9067770d4aed

  • SHA256

    5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023

  • SHA512

    147fd08c61543694a9aa4344f6fa179922ec318dda746abe045a9862f63fa71d1479fe58dcf7ee2fd9fbcef4bafeda5f66d2803de9d7e7abcaed5d941377c893

Score
9/10

Malware Config

Targets

    • Target

      5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023

    • Size

      31KB

    • MD5

      25e2f3770de67a52720c041f37defeca

    • SHA1

      952320907552081a5887570c155e9067770d4aed

    • SHA256

      5d15a9b38a5390a83a761f5b42790934569870222bc3bc94e4dc5e43f9959023

    • SHA512

      147fd08c61543694a9aa4344f6fa179922ec318dda746abe045a9862f63fa71d1479fe58dcf7ee2fd9fbcef4bafeda5f66d2803de9d7e7abcaed5d941377c893

    Score
    9/10
    • Contacts a large (100185) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Tasks