General

  • Target

    36dee46232f07f906d45f9859833b072

  • Size

    99KB

  • Sample

    231219-2xaywafeaq

  • MD5

    36dee46232f07f906d45f9859833b072

  • SHA1

    d5074bee52daf45490036b3cd3e68d6c691ec683

  • SHA256

    3fbdd2a1af07ba57212df89ebac25a7b21550d3cf4031bf3324f4751653239e2

  • SHA512

    cfc60f64e5fa81d43f5b707af11c9f793777d48f7025ac54981385b41ac93afa3b21fb48d4d414f5cdc511baff3c28dfb30d70f0233b0ad0fbf78cc8d58d3f87

  • SSDEEP

    3072:Qh0cLCNUUbWp6spvCuZxdGNKYxCkxlUmmgXchQ7IagHM:Qh02wWs8BrLiZxummgXchQ7IagHM

Score
10/10

Malware Config

Targets

    • Target

      36dee46232f07f906d45f9859833b072

    • Size

      99KB

    • MD5

      36dee46232f07f906d45f9859833b072

    • SHA1

      d5074bee52daf45490036b3cd3e68d6c691ec683

    • SHA256

      3fbdd2a1af07ba57212df89ebac25a7b21550d3cf4031bf3324f4751653239e2

    • SHA512

      cfc60f64e5fa81d43f5b707af11c9f793777d48f7025ac54981385b41ac93afa3b21fb48d4d414f5cdc511baff3c28dfb30d70f0233b0ad0fbf78cc8d58d3f87

    • SSDEEP

      3072:Qh0cLCNUUbWp6spvCuZxdGNKYxCkxlUmmgXchQ7IagHM:Qh02wWs8BrLiZxummgXchQ7IagHM

    Score
    7/10
    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks