General
-
Target
SecuriteInfo.com.Linux.Siggen.9999.19908.21489.elf
-
Size
31KB
-
Sample
230529-w4babsda54
-
MD5
687be0db64e721cafa547f1717c5e7d1
-
SHA1
c817451dc6d72adfe602330fa333058db45d7963
-
SHA256
d11d572a1404d32ffc062ad741c29588ccd4af2da03aafa8081d059119e2bfd7
-
SHA512
f1504959e986f1b751776a81115fb214788b673b4bb9d4f80cb6826795a43e3077df74e1404dc85e16725b8fc17fe50856b25b5d887bd3718304edd23de748d5
-
SSDEEP
768:JgmeI3ZV7A/9k9mPf+JOcEXVigSwPPnNOoslXh1YSU6DCJgGlzDpUYsyU:Jn3H0/W90fMFai+k/VGVqYZU
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Linux.Siggen.9999.19908.21489.elf
-
Size
31KB
-
MD5
687be0db64e721cafa547f1717c5e7d1
-
SHA1
c817451dc6d72adfe602330fa333058db45d7963
-
SHA256
d11d572a1404d32ffc062ad741c29588ccd4af2da03aafa8081d059119e2bfd7
-
SHA512
f1504959e986f1b751776a81115fb214788b673b4bb9d4f80cb6826795a43e3077df74e1404dc85e16725b8fc17fe50856b25b5d887bd3718304edd23de748d5
-
SSDEEP
768:JgmeI3ZV7A/9k9mPf+JOcEXVigSwPPnNOoslXh1YSU6DCJgGlzDpUYsyU:Jn3H0/W90fMFai+k/VGVqYZU
-
Contacts a large (200000) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-