General
-
Target
0ca4bd19baf623cbe97d3b1c4284084b
-
Size
102KB
-
Sample
231219-2d9yvsgean
-
MD5
0ca4bd19baf623cbe97d3b1c4284084b
-
SHA1
0982942fded42d4dbfe14cab9f6efbbb3b0cec9c
-
SHA256
b0ca2e1c4f3e524f593a35dcb6bc35b0d740588e87c47cfd29b9348d4f7ed975
-
SHA512
43bd415bead218e45e50b2a71f4705939528933d8b90cdc7bf795e7dcbc88786418b8f52468eb50d433718d6bd41e8931f7f4043cf7ca98b5319f5df9e2d9f0e
-
SSDEEP
1536:1eLBA8EPuP+CFMgTW+K5gJsRVfgytdQV9xqJS1swmqHIVcqqWNGnQOT:EAVuaH5gJsRFgavoswmqoVcqq6GnQOT
Behavioral task
behavioral1
Sample
0ca4bd19baf623cbe97d3b1c4284084b
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Targets
-
-
Target
0ca4bd19baf623cbe97d3b1c4284084b
-
Size
102KB
-
MD5
0ca4bd19baf623cbe97d3b1c4284084b
-
SHA1
0982942fded42d4dbfe14cab9f6efbbb3b0cec9c
-
SHA256
b0ca2e1c4f3e524f593a35dcb6bc35b0d740588e87c47cfd29b9348d4f7ed975
-
SHA512
43bd415bead218e45e50b2a71f4705939528933d8b90cdc7bf795e7dcbc88786418b8f52468eb50d433718d6bd41e8931f7f4043cf7ca98b5319f5df9e2d9f0e
-
SSDEEP
1536:1eLBA8EPuP+CFMgTW+K5gJsRVfgytdQV9xqJS1swmqHIVcqqWNGnQOT:EAVuaH5gJsRFgavoswmqoVcqq6GnQOT
Score9/10-
Contacts a large (23683) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-