General
-
Target
753eadc34e4673b2665fd2555ba59de7
-
Size
29KB
-
Sample
231220-att4ssccfr
-
MD5
753eadc34e4673b2665fd2555ba59de7
-
SHA1
c1374f6ad28864039cf721e80cc047131086e637
-
SHA256
3e677cf7952e309bb21d18a646e6281d30bbbe98d4426ac24cb5181b9f9fd461
-
SHA512
2a89bb5265974d482f4b09270d051fb95df3e4731e43611e490fdea721af313540b59e5a41bb6c42bb256185d8764f71f910e04125e18c4bc1fc9eeb581a6528
-
SSDEEP
768:A33vptH913OQ4FSVhmA2KqsAC9Y5VbNmaAOkhAs3Uoz6:uRtHfeQ4wVhmA2Kdd65VNmaA1z6
Malware Config
Targets
-
-
Target
753eadc34e4673b2665fd2555ba59de7
-
Size
29KB
-
MD5
753eadc34e4673b2665fd2555ba59de7
-
SHA1
c1374f6ad28864039cf721e80cc047131086e637
-
SHA256
3e677cf7952e309bb21d18a646e6281d30bbbe98d4426ac24cb5181b9f9fd461
-
SHA512
2a89bb5265974d482f4b09270d051fb95df3e4731e43611e490fdea721af313540b59e5a41bb6c42bb256185d8764f71f910e04125e18c4bc1fc9eeb581a6528
-
SSDEEP
768:A33vptH913OQ4FSVhmA2KqsAC9Y5VbNmaAOkhAs3Uoz6:uRtHfeQ4wVhmA2Kdd65VNmaA1z6
-
Contacts a large (19952) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-