General
-
Target
bccb14d92fcc98d3ecfade6a5e56d321
-
Size
300KB
-
Sample
240309-ztbd5aag2w
-
MD5
bccb14d92fcc98d3ecfade6a5e56d321
-
SHA1
dfdde835ea17797d5f4643ae24dbad73f029fcac
-
SHA256
cd1df46923524de02c032a64afbbe7316c4c40f1a4242fc8b7227cb19b9a9337
-
SHA512
1183de00850be4b4743916876db54d0128cfd9abacfedc71927791a07467ebf4f0ec694a60541dde986a89576cffc868e4509417e6a5195d3937f6e7ef56d4b1
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xioK:p3lOYoaja8xzx/0wsxzSi1
Behavioral task
behavioral1
Sample
bccb14d92fcc98d3ecfade6a5e56d321
Resource
debian9-mipsbe-20240226-en
Malware Config
Targets
-
-
Target
bccb14d92fcc98d3ecfade6a5e56d321
-
Size
300KB
-
MD5
bccb14d92fcc98d3ecfade6a5e56d321
-
SHA1
dfdde835ea17797d5f4643ae24dbad73f029fcac
-
SHA256
cd1df46923524de02c032a64afbbe7316c4c40f1a4242fc8b7227cb19b9a9337
-
SHA512
1183de00850be4b4743916876db54d0128cfd9abacfedc71927791a07467ebf4f0ec694a60541dde986a89576cffc868e4509417e6a5195d3937f6e7ef56d4b1
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xioK:p3lOYoaja8xzx/0wsxzSi1
Score9/10-
Contacts a large (9042) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Patched UPX-packed file
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-
Writes file to system bin folder
-