General

  • Target

    578757dc6215463f921f3d2fc61ebcdc51d43b61cb81e2dfe77c9927577f6f98

  • Size

    33KB

  • Sample

    220521-p6hnvsbhgm

  • MD5

    3797a3479e4ecc87ed7cde9177428d0b

  • SHA1

    0130d750edd63edd1b96e34ee86298595facc3fd

  • SHA256

    578757dc6215463f921f3d2fc61ebcdc51d43b61cb81e2dfe77c9927577f6f98

  • SHA512

    0d4a9cb7f2b5bafdd9930604bfe3ec9306a8074ecc4e9c9422fc4a556cff42fe29685d5fad8f161aa5f11b6dc53f5cb437e2b463230074d43a32bfdd4226d890

Score
9/10

Malware Config

Targets

    • Target

      578757dc6215463f921f3d2fc61ebcdc51d43b61cb81e2dfe77c9927577f6f98

    • Size

      33KB

    • MD5

      3797a3479e4ecc87ed7cde9177428d0b

    • SHA1

      0130d750edd63edd1b96e34ee86298595facc3fd

    • SHA256

      578757dc6215463f921f3d2fc61ebcdc51d43b61cb81e2dfe77c9927577f6f98

    • SHA512

      0d4a9cb7f2b5bafdd9930604bfe3ec9306a8074ecc4e9c9422fc4a556cff42fe29685d5fad8f161aa5f11b6dc53f5cb437e2b463230074d43a32bfdd4226d890

    Score
    9/10
    • Contacts a large (244012) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Tasks