General

  • Target

    fd81d8a0be2c12f5850617967249d2146dff59435168b2887e99909f271f5081

  • Size

    89KB

  • Sample

    220524-bs68eafagn

  • MD5

    623a8f1abb5800afe3e1a9d86c426805

  • SHA1

    f54f7c85c26b92a6e1e09bce5e393f368154bb09

  • SHA256

    fd81d8a0be2c12f5850617967249d2146dff59435168b2887e99909f271f5081

  • SHA512

    c4b70c0417cc88da9f7aad73fece297d9358ef56a91e63f057722f9de69368c1efc9fb6b18364c9f97f4b762d67d6ea1c65c82c8f7d6c6156d363e2951f56020

Score
9/10

Malware Config

Targets

    • Target

      fd81d8a0be2c12f5850617967249d2146dff59435168b2887e99909f271f5081

    • Size

      89KB

    • MD5

      623a8f1abb5800afe3e1a9d86c426805

    • SHA1

      f54f7c85c26b92a6e1e09bce5e393f368154bb09

    • SHA256

      fd81d8a0be2c12f5850617967249d2146dff59435168b2887e99909f271f5081

    • SHA512

      c4b70c0417cc88da9f7aad73fece297d9358ef56a91e63f057722f9de69368c1efc9fb6b18364c9f97f4b762d67d6ea1c65c82c8f7d6c6156d363e2951f56020

    Score
    9/10
    • Contacts a large (20390) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Enterprise v6

Tasks