General

  • Target

    0d806caa68fd5a9a459c23ab8646870f

  • Size

    61KB

  • Sample

    231219-2elmnagfcl

  • MD5

    0d806caa68fd5a9a459c23ab8646870f

  • SHA1

    4fec904af52ee92203ad2072d6f65f38de1fef6d

  • SHA256

    9ed08e8012d0d4b10bb40b52bafc802bd25fdcb9067e62ef86946923ece670ce

  • SHA512

    e4182e87b9d2f16fb8b4de8ea23406bba49956d51054486201d5a365f575060667273580778a97a40ef90ddae526c57e8ccb6e4d4566c2d7e96beba6db51da5f

  • SSDEEP

    1536:cuEIRnlJsSJFv3y7xrsSPgUCsYuUo1qvAgbiq3utLCLqg:clGn48y7xrsSPgUCsYXfiq3uteh

Score
10/10

Malware Config

Targets

    • Target

      0d806caa68fd5a9a459c23ab8646870f

    • Size

      61KB

    • MD5

      0d806caa68fd5a9a459c23ab8646870f

    • SHA1

      4fec904af52ee92203ad2072d6f65f38de1fef6d

    • SHA256

      9ed08e8012d0d4b10bb40b52bafc802bd25fdcb9067e62ef86946923ece670ce

    • SHA512

      e4182e87b9d2f16fb8b4de8ea23406bba49956d51054486201d5a365f575060667273580778a97a40ef90ddae526c57e8ccb6e4d4566c2d7e96beba6db51da5f

    • SSDEEP

      1536:cuEIRnlJsSJFv3y7xrsSPgUCsYuUo1qvAgbiq3utLCLqg:clGn48y7xrsSPgUCsYXfiq3uteh

    Score
    9/10
    • Contacts a large (23034) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks