General

  • Target

    040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7

  • Size

    33KB

  • Sample

    220521-p7hegscaek

  • MD5

    4ad284ea99b6de1e4110076ef5b887a9

  • SHA1

    30e55fb2ce8255ba328af91019a612940f738fd1

  • SHA256

    040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7

  • SHA512

    c545e403fb6d3a0c463cf7e6e0f54d68203d3ea791a88b5f6be86673129ca4307d6ebcad4f868a61feee43b3fd5ebd8088b522f14e2adf9928a86549336ac9e2

Score
9/10

Malware Config

Targets

    • Target

      040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7

    • Size

      33KB

    • MD5

      4ad284ea99b6de1e4110076ef5b887a9

    • SHA1

      30e55fb2ce8255ba328af91019a612940f738fd1

    • SHA256

      040d51bab5adcad9857b663ce666b0b113e4db2e32ebfe95fb3601b1a6def8b7

    • SHA512

      c545e403fb6d3a0c463cf7e6e0f54d68203d3ea791a88b5f6be86673129ca4307d6ebcad4f868a61feee43b3fd5ebd8088b522f14e2adf9928a86549336ac9e2

    Score
    9/10
    • Contacts a large (23510) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Tasks