General

  • Target

    2553ba33f12d0f36972a3c36d8b4610fa4733608c72ca4bbafad178e0e1b34d3

  • Size

    164KB

  • Sample

    220521-qctdyahca8

  • MD5

    5b956b60ccc3bcac6535b48aa49e1125

  • SHA1

    9226ba461a72ff058003274ac7194b90c56af399

  • SHA256

    2553ba33f12d0f36972a3c36d8b4610fa4733608c72ca4bbafad178e0e1b34d3

  • SHA512

    4937c37f2c9e15e469f254a904a0bc0ed937c98f05caae5ed2f6c44305f3e8bfedf0e351a74ef7845c897e3152d41ecadac90584ade3d8d2bb8a9a1f8f93cf16

Malware Config

Targets

    • Target

      2553ba33f12d0f36972a3c36d8b4610fa4733608c72ca4bbafad178e0e1b34d3

    • Size

      164KB

    • MD5

      5b956b60ccc3bcac6535b48aa49e1125

    • SHA1

      9226ba461a72ff058003274ac7194b90c56af399

    • SHA256

      2553ba33f12d0f36972a3c36d8b4610fa4733608c72ca4bbafad178e0e1b34d3

    • SHA512

      4937c37f2c9e15e469f254a904a0bc0ed937c98f05caae5ed2f6c44305f3e8bfedf0e351a74ef7845c897e3152d41ecadac90584ade3d8d2bb8a9a1f8f93cf16

    Score
    9/10
    • Contacts a large (23836) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Scanning

2
T1046

System Network Configuration Discovery

2
T1016

Tasks