General

  • Target

    9240226b82e40349d85146e67fd30094.bin

  • Size

    41KB

  • Sample

    231030-ca22eaca66

  • MD5

    c7dea31870199b89ecb57a4e220f3c86

  • SHA1

    762cbe611d33ddaf586ea09d404f57108730ca9a

  • SHA256

    5d228be9f5de61816e1eb850fed2fb4997200c0be1d95403fd235683e075de1a

  • SHA512

    490334cd2bbddcfd4cbf93a9e7a89666a352cd483136050cda9b3e04da1f6e200b4fb21366d774604316d64078dad52029d0a8f37c2b10d06458e62f25a2f0e4

  • SSDEEP

    768:rZvTrg+V2Rh6Vs545M9dAM6me/pMcWNcu0W4l6rmsEow30bpyr5hj:dORIVsyOL6npMNx4Vs2kbI7

Malware Config

Targets

    • Target

      597a9f6fb791f728d4b26f9c7ae77c81dd416c53ed3179d95cbfbae23e6bfd3e.elf

    • Size

      82KB

    • MD5

      9240226b82e40349d85146e67fd30094

    • SHA1

      3b2cdef96cd3096caf3f81b7db0962e244724a7e

    • SHA256

      597a9f6fb791f728d4b26f9c7ae77c81dd416c53ed3179d95cbfbae23e6bfd3e

    • SHA512

      6720f962fd65b3242242ee23d16c4ea5133c539e454e97213035bca6411ef22cfb3afa7da57f99e8fa730c20ea44b8c3744f32a008f4032cc5f8d8b1170c1812

    • SSDEEP

      1536:+zeLJsGwYY3+4vrRdQGCO66/9n+B7fBC1Nb3FPjFv:+zU+nWuRdoZ6/9u7fc1Nb3xFv

    Score
    9/10
    • Contacts a large (144314) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Deletes Audit logs

      Deletes logs related to the Linux Audit framework.

    • Deletes itself

    • Deletes journal logs

      Deletes systemd journal logs. Likely to evade detection.

    • Deletes system logs

      Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks