General

  • Target

    16d195917a3418c17e4d32c17c676351

  • Size

    2.8MB

  • Sample

    231219-2h486sdcd6

  • MD5

    16d195917a3418c17e4d32c17c676351

  • SHA1

    919a04b017920186f0342f7ffdc65f5202da518d

  • SHA256

    ba7ea424d66262f02f68c3bfcd1e768bb9c83770e5e2a6da9e7df1844b4e8e3c

  • SHA512

    c3686f8c1d1bdcbde65c1d00d1032b9887d381c413fa15a20c169c75d947f7a38342ba54b429eaffbd5856e7c2f58d2bb2be4c53d36f95d1622e5a1143c8778a

  • SSDEEP

    49152:AiPwlMnTTUynSYL6tTLqvWEv9kTYqVcu2BnSUlfXHg/zCV7nE7psIgrEkUa:/P0wUyL2tTLquw9Z0cbXALCV7nE4Eha

Malware Config

Targets

    • Target

      16d195917a3418c17e4d32c17c676351

    • Size

      2.8MB

    • MD5

      16d195917a3418c17e4d32c17c676351

    • SHA1

      919a04b017920186f0342f7ffdc65f5202da518d

    • SHA256

      ba7ea424d66262f02f68c3bfcd1e768bb9c83770e5e2a6da9e7df1844b4e8e3c

    • SHA512

      c3686f8c1d1bdcbde65c1d00d1032b9887d381c413fa15a20c169c75d947f7a38342ba54b429eaffbd5856e7c2f58d2bb2be4c53d36f95d1622e5a1143c8778a

    • SSDEEP

      49152:AiPwlMnTTUynSYL6tTLqvWEv9kTYqVcu2BnSUlfXHg/zCV7nE7psIgrEkUa:/P0wUyL2tTLquw9Z0cbXALCV7nE4Eha

    • Contacts a large (5904) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies the dynamic linker configuration file

      Malware can modify the configuration file of the dynamic linker to preload malicous libraries with every executed process.

    • Changes its process name

    • Executes dropped EXE

    • Modifies hosts file

      Adds to hosts file used for mapping hosts to IP addresses.

    • Attempts to change immutable files

      Modifies inode attributes on the filesystem to allow changing of immutable files.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Reads CPU attributes

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks