General

  • Target

    69e5b693f945f76f3a207b1181ddf8cca7c21077fe7bf0fb25734e4981462b24

  • Size

    94KB

  • Sample

    220521-pz4yhsgcf9

  • MD5

    b1985834ad121351299960ef996c33fa

  • SHA1

    c916c9c7bffeaac7c84715fa9fd5813afc60979a

  • SHA256

    69e5b693f945f76f3a207b1181ddf8cca7c21077fe7bf0fb25734e4981462b24

  • SHA512

    2828e1f8ce5082f1e59c7ffa9e78eabf6c03e4762ca366509316930a3cfaf5de699f6c62b31a5eaf8d77af069a110c8fc0685d519cf2abdc6c3628488aa36830

Score
9/10

Malware Config

Targets

    • Target

      69e5b693f945f76f3a207b1181ddf8cca7c21077fe7bf0fb25734e4981462b24

    • Size

      94KB

    • MD5

      b1985834ad121351299960ef996c33fa

    • SHA1

      c916c9c7bffeaac7c84715fa9fd5813afc60979a

    • SHA256

      69e5b693f945f76f3a207b1181ddf8cca7c21077fe7bf0fb25734e4981462b24

    • SHA512

      2828e1f8ce5082f1e59c7ffa9e78eabf6c03e4762ca366509316930a3cfaf5de699f6c62b31a5eaf8d77af069a110c8fc0685d519cf2abdc6c3628488aa36830

    Score
    9/10
    • Contacts a large (23030) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Scanning

2
T1046

Tasks