General

  • Target

    75c7ba15ae5572939a7d1bd4dd57a393

  • Size

    235KB

  • Sample

    231222-g8f9taahbn

  • MD5

    75c7ba15ae5572939a7d1bd4dd57a393

  • SHA1

    d06fc1e2fcef9c4b2f78ea2acc88852c5445b9aa

  • SHA256

    b09956fdc550ffd594bcfef6d2a85e4382b828b349fa4e7f9232601417b83282

  • SHA512

    62504a888dc73afee79292f31ec070539a367ef48a8a44291e7c976f26ee053573965b80a9198d4cd9791dbbadc083aff76142dc2693a6c08bd54e36cbe6370e

  • SSDEEP

    3072:/TNVO/QJHZcfFj4rwLQGTNO5VZLwHm7vuQTpZUyY6co:7O/QJHZweEL/NOjCHm7FZZnc

Malware Config

Targets

    • Target

      75c7ba15ae5572939a7d1bd4dd57a393

    • Size

      235KB

    • MD5

      75c7ba15ae5572939a7d1bd4dd57a393

    • SHA1

      d06fc1e2fcef9c4b2f78ea2acc88852c5445b9aa

    • SHA256

      b09956fdc550ffd594bcfef6d2a85e4382b828b349fa4e7f9232601417b83282

    • SHA512

      62504a888dc73afee79292f31ec070539a367ef48a8a44291e7c976f26ee053573965b80a9198d4cd9791dbbadc083aff76142dc2693a6c08bd54e36cbe6370e

    • SSDEEP

      3072:/TNVO/QJHZcfFj4rwLQGTNO5VZLwHm7vuQTpZUyY6co:7O/QJHZweEL/NOjCHm7FZZnc

    • Contacts a large (13000) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks