General

  • Target

    4ffeb4b3473d4260056d9299ad19d5b589907e6b219608523699022888ebd761.elf

  • Size

    47KB

  • Sample

    240212-egp2jafb4x

  • MD5

    72babfca52ee78fb2ab3a7b1b326970e

  • SHA1

    58993713cdaa38d5faa0e059a8ad36299846827c

  • SHA256

    4ffeb4b3473d4260056d9299ad19d5b589907e6b219608523699022888ebd761

  • SHA512

    17c860513b7f49c58c3cc63fd4029bcc20d9eb68059a850b265b56a1498cd1ce9cbd4a76929d34447d726417c194011a7ef525f9276ff9c9f0c0e788b9910083

  • SSDEEP

    768:MvPT5GSzhkunudh3BI5AUT/rg32vbwLrHJtCBovtrhpVkNqBT4RZGz:CNNjAAr3c3vCBarhbAq9cU

Score
9/10

Malware Config

Targets

    • Target

      4ffeb4b3473d4260056d9299ad19d5b589907e6b219608523699022888ebd761.elf

    • Size

      47KB

    • MD5

      72babfca52ee78fb2ab3a7b1b326970e

    • SHA1

      58993713cdaa38d5faa0e059a8ad36299846827c

    • SHA256

      4ffeb4b3473d4260056d9299ad19d5b589907e6b219608523699022888ebd761

    • SHA512

      17c860513b7f49c58c3cc63fd4029bcc20d9eb68059a850b265b56a1498cd1ce9cbd4a76929d34447d726417c194011a7ef525f9276ff9c9f0c0e788b9910083

    • SSDEEP

      768:MvPT5GSzhkunudh3BI5AUT/rg32vbwLrHJtCBovtrhpVkNqBT4RZGz:CNNjAAr3c3vCBarhbAq9cU

    Score
    9/10
    • Contacts a large (38388) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks