General

  • Target

    home.x86_64

  • Size

    36KB

  • Sample

    220814-2bxwhsdhb6

  • MD5

    d30302016320d33d457a9247af9483f6

  • SHA1

    65f5907190d1da1f25726b2d6e06b2de2541de56

  • SHA256

    638e08ca898a9447b6a0e7ccc9d94d567e2616fcc45dcd6f603dbc3588cfde76

  • SHA512

    02c49da60e13295dd4a68c6d83df393b43dbf57d5cc8b20b8d1befe53921c3135284db7cc5fafd488f7bfa2ae4d497072ef8a1efb65e5a0c3b95fa12a9506bd9

Score
9/10

Malware Config

Targets

    • Target

      home.x86_64

    • Size

      36KB

    • MD5

      d30302016320d33d457a9247af9483f6

    • SHA1

      65f5907190d1da1f25726b2d6e06b2de2541de56

    • SHA256

      638e08ca898a9447b6a0e7ccc9d94d567e2616fcc45dcd6f603dbc3588cfde76

    • SHA512

      02c49da60e13295dd4a68c6d83df393b43dbf57d5cc8b20b8d1befe53921c3135284db7cc5fafd488f7bfa2ae4d497072ef8a1efb65e5a0c3b95fa12a9506bd9

    Score
    9/10
    • Contacts a large (446630) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Tasks