General
-
Target
071d2c61b47995a585394dbe3d80f463
-
Size
257KB
-
Sample
231229-3lfwesgcfr
-
MD5
071d2c61b47995a585394dbe3d80f463
-
SHA1
4ca2fc1906e47981ae3673528e7527580e5b7afa
-
SHA256
50b203d91772dc901d916db7b466d153429d4db43337cc6816b40cf8b0d8430a
-
SHA512
bb5289500718bbf46acd5f7e5ac802cc49b59aa5a317dcdd0c245028e820ce64771e9cb9095987d9fa1f9ccaaf4e2791668fb6b11aa8a17f65859982156e1f9d
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi
Behavioral task
behavioral1
Sample
071d2c61b47995a585394dbe3d80f463
Resource
debian9-mipsbe-20231215-en
Malware Config
Targets
-
-
Target
071d2c61b47995a585394dbe3d80f463
-
Size
257KB
-
MD5
071d2c61b47995a585394dbe3d80f463
-
SHA1
4ca2fc1906e47981ae3673528e7527580e5b7afa
-
SHA256
50b203d91772dc901d916db7b466d153429d4db43337cc6816b40cf8b0d8430a
-
SHA512
bb5289500718bbf46acd5f7e5ac802cc49b59aa5a317dcdd0c245028e820ce64771e9cb9095987d9fa1f9ccaaf4e2791668fb6b11aa8a17f65859982156e1f9d
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi
Score9/10-
Contacts a large (8409) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Patched UPX-packed file
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-
Writes file to system bin folder
-