General

  • Target

    53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626.elf

  • Size

    71KB

  • Sample

    240212-eaxsssgb53

  • MD5

    25242faa9a866789e8bf0b6610286a41

  • SHA1

    6f400414c0c45d0577f6cf8e2540168641f78f49

  • SHA256

    53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626

  • SHA512

    70d322600a5261d73d1cae04b238f601af0c6d7adbdd0816d63de7efd8c828015d1b8cb5c0b69546385e9492d976f834b7f5a3bc87393bf834e3b239f9b01838

  • SSDEEP

    1536:Qjn4Tb2ST0BzhNR42u3t7AArYgZwdBGglD9l+9i5Sea6AU2:3HfT0BzhEC2YgZwdBGLmSeavU2

Score
9/10

Malware Config

Targets

    • Target

      53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626.elf

    • Size

      71KB

    • MD5

      25242faa9a866789e8bf0b6610286a41

    • SHA1

      6f400414c0c45d0577f6cf8e2540168641f78f49

    • SHA256

      53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626

    • SHA512

      70d322600a5261d73d1cae04b238f601af0c6d7adbdd0816d63de7efd8c828015d1b8cb5c0b69546385e9492d976f834b7f5a3bc87393bf834e3b239f9b01838

    • SSDEEP

      1536:Qjn4Tb2ST0BzhNR42u3t7AArYgZwdBGglD9l+9i5Sea6AU2:3HfT0BzhEC2YgZwdBGLmSeavU2

    Score
    9/10
    • Contacts a large (36846) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks