General

  • Target

    29364293b5f258feac47e0b804087ca3c63ae17c52644b45a79fe50e1bbac28c

  • Size

    77KB

  • Sample

    220521-pz6gcagcg3

  • MD5

    e7b138d1d70b96bab301a68db06ef7a1

  • SHA1

    01aa2e2fec8f0374b62104211580635059e39e29

  • SHA256

    29364293b5f258feac47e0b804087ca3c63ae17c52644b45a79fe50e1bbac28c

  • SHA512

    d1dcfc1eab8164925e5c7993baadde89162e9df3c07a68ef82ae39054b385a49f013d56bf6d98fecf78bf84253960b3d9454d7143b3130871f8106edce652cd0

Score
9/10

Malware Config

Targets

    • Target

      29364293b5f258feac47e0b804087ca3c63ae17c52644b45a79fe50e1bbac28c

    • Size

      77KB

    • MD5

      e7b138d1d70b96bab301a68db06ef7a1

    • SHA1

      01aa2e2fec8f0374b62104211580635059e39e29

    • SHA256

      29364293b5f258feac47e0b804087ca3c63ae17c52644b45a79fe50e1bbac28c

    • SHA512

      d1dcfc1eab8164925e5c7993baadde89162e9df3c07a68ef82ae39054b385a49f013d56bf6d98fecf78bf84253960b3d9454d7143b3130871f8106edce652cd0

    Score
    9/10
    • Contacts a large (23994) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Scanning

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks