General

  • Target

    071d2c61b47995a585394dbe3d80f463

  • Size

    257KB

  • Sample

    231229-3lfwesgcfr

  • MD5

    071d2c61b47995a585394dbe3d80f463

  • SHA1

    4ca2fc1906e47981ae3673528e7527580e5b7afa

  • SHA256

    50b203d91772dc901d916db7b466d153429d4db43337cc6816b40cf8b0d8430a

  • SHA512

    bb5289500718bbf46acd5f7e5ac802cc49b59aa5a317dcdd0c245028e820ce64771e9cb9095987d9fa1f9ccaaf4e2791668fb6b11aa8a17f65859982156e1f9d

  • SSDEEP

    3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi

Malware Config

Targets

    • Target

      071d2c61b47995a585394dbe3d80f463

    • Size

      257KB

    • MD5

      071d2c61b47995a585394dbe3d80f463

    • SHA1

      4ca2fc1906e47981ae3673528e7527580e5b7afa

    • SHA256

      50b203d91772dc901d916db7b466d153429d4db43337cc6816b40cf8b0d8430a

    • SHA512

      bb5289500718bbf46acd5f7e5ac802cc49b59aa5a317dcdd0c245028e820ce64771e9cb9095987d9fa1f9ccaaf4e2791668fb6b11aa8a17f65859982156e1f9d

    • SSDEEP

      3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi

    • Contacts a large (8409) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks