General

  • Target

    1f365098dae9313a7ea21cef7ed01949

  • Size

    22KB

  • Sample

    220810-29n19sgbbn

  • MD5

    1f365098dae9313a7ea21cef7ed01949

  • SHA1

    4b54ad488afc5a270097dc8e83a36d74d488dca3

  • SHA256

    6e8d36faf6cd93f1eb37c3db8249c3b6e9886e3f336b4cc47d5e747a1f70dcaf

  • SHA512

    770d84d13ef0c1d96663ebe5d6f0dd3f1e1b49a2ab128dc27c4cb11e35ebda8d9b5dbbed895d1975a07ddb7da3097b11d29f81bbe492f980a323565660fb0823

Score
9/10

Malware Config

Targets

    • Target

      1f365098dae9313a7ea21cef7ed01949

    • Size

      22KB

    • MD5

      1f365098dae9313a7ea21cef7ed01949

    • SHA1

      4b54ad488afc5a270097dc8e83a36d74d488dca3

    • SHA256

      6e8d36faf6cd93f1eb37c3db8249c3b6e9886e3f336b4cc47d5e747a1f70dcaf

    • SHA512

      770d84d13ef0c1d96663ebe5d6f0dd3f1e1b49a2ab128dc27c4cb11e35ebda8d9b5dbbed895d1975a07ddb7da3097b11d29f81bbe492f980a323565660fb0823

    Score
    9/10
    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Tasks