General

  • Target

    597671cd3734a31b11003cc76fbe8ce2

  • Size

    288KB

  • Sample

    240113-1dhc6sedfk

  • MD5

    597671cd3734a31b11003cc76fbe8ce2

  • SHA1

    6d3343bc8bd8e35be00fb351e026d47d5eb8b2f9

  • SHA256

    228afed98ae0a5db14c0a3fd9f6944cb1df671ceb93935fa806b98bc67b43887

  • SHA512

    ec1e19234dec15ead88f160486023b6759ab478d053b14c888e6ea78a4e4ba37b4a10740846def7de599dedbfcce4f0855a75f1a4d6428ecc85826e2005f48e6

  • SSDEEP

    6144:p3lOYoaja8xzx/0wsxzSigabE5wKSDP99zBa77oNsKqqfPqOJ:p1CG/jsxzXgabEDSDP99zBa/HKqoPqOJ

Malware Config

Targets

    • Target

      597671cd3734a31b11003cc76fbe8ce2

    • Size

      288KB

    • MD5

      597671cd3734a31b11003cc76fbe8ce2

    • SHA1

      6d3343bc8bd8e35be00fb351e026d47d5eb8b2f9

    • SHA256

      228afed98ae0a5db14c0a3fd9f6944cb1df671ceb93935fa806b98bc67b43887

    • SHA512

      ec1e19234dec15ead88f160486023b6759ab478d053b14c888e6ea78a4e4ba37b4a10740846def7de599dedbfcce4f0855a75f1a4d6428ecc85826e2005f48e6

    • SSDEEP

      6144:p3lOYoaja8xzx/0wsxzSigabE5wKSDP99zBa77oNsKqqfPqOJ:p1CG/jsxzXgabEDSDP99zBa/HKqoPqOJ

    • Contacts a large (13934) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks