General

  • Target

    af77967197f9e78b3f8164f4a8027e52e7729ac6074e09f14fe728125af6ee2f.elf

  • Size

    62KB

  • Sample

    240213-fajfvaah9s

  • MD5

    28b5704932e9924cd9676d8d026da606

  • SHA1

    4b9825d46dce034cea1a6ba7aa48bef0f14aa0ea

  • SHA256

    af77967197f9e78b3f8164f4a8027e52e7729ac6074e09f14fe728125af6ee2f

  • SHA512

    11b751add90e0b3abadc611eb3796f09bf2d01781df3381809d0b40df7aa5aee3dec01db586d72e7a7fe1b0cbfab5ecf0235a77da01b23eac1cdf5ac1467eebe

  • SSDEEP

    1536:gZo0FWzvWy0fj61qWR99xapxSWf4uVjEaI1hFCkulWh:gA+y0b61qWR99xapxSWf4uVjEayFFCWh

Score
9/10

Malware Config

Targets

    • Target

      af77967197f9e78b3f8164f4a8027e52e7729ac6074e09f14fe728125af6ee2f.elf

    • Size

      62KB

    • MD5

      28b5704932e9924cd9676d8d026da606

    • SHA1

      4b9825d46dce034cea1a6ba7aa48bef0f14aa0ea

    • SHA256

      af77967197f9e78b3f8164f4a8027e52e7729ac6074e09f14fe728125af6ee2f

    • SHA512

      11b751add90e0b3abadc611eb3796f09bf2d01781df3381809d0b40df7aa5aee3dec01db586d72e7a7fe1b0cbfab5ecf0235a77da01b23eac1cdf5ac1467eebe

    • SSDEEP

      1536:gZo0FWzvWy0fj61qWR99xapxSWf4uVjEaI1hFCkulWh:gA+y0b61qWR99xapxSWf4uVjEayFFCWh

    Score
    9/10
    • Contacts a large (30455) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks