General

  • Target

    la.bot.arm7-20230923-0250.elf

  • Size

    68KB

  • Sample

    230923-dbmtjsdg88

  • MD5

    251f1ce8b73d3c2759a7c72c4d19e6a4

  • SHA1

    3477664b93be74bfe5dcf866f0ae9094e0327f17

  • SHA256

    0d63de3148dc3037625b4e0a3a69c24c56aca458076e96f3249463a3c51e0c1c

  • SHA512

    8eac70e8154a526c4dc94251fc5e190ff30d816772b986a477b3a09f076fe660a94cc985c8f74cb1f7a8daff8bb994a35fbe279fa56102cea5146eebf96a9f34

  • SSDEEP

    1536:CYnEXUhyrspE8OEXYfl9YAgbY3qP5A9XdQiuexld9l0Mi4BjhxNyf:2EhygpE8OTYZ8R9XdQiue2WBjhDy

Score
9/10

Malware Config

Targets

    • Target

      la.bot.arm7-20230923-0250.elf

    • Size

      68KB

    • MD5

      251f1ce8b73d3c2759a7c72c4d19e6a4

    • SHA1

      3477664b93be74bfe5dcf866f0ae9094e0327f17

    • SHA256

      0d63de3148dc3037625b4e0a3a69c24c56aca458076e96f3249463a3c51e0c1c

    • SHA512

      8eac70e8154a526c4dc94251fc5e190ff30d816772b986a477b3a09f076fe660a94cc985c8f74cb1f7a8daff8bb994a35fbe279fa56102cea5146eebf96a9f34

    • SSDEEP

      1536:CYnEXUhyrspE8OEXYfl9YAgbY3qP5A9XdQiuexld9l0Mi4BjhxNyf:2EhygpE8OTYZ8R9XdQiue2WBjhDy

    Score
    9/10
    • Contacts a large (33004) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks