General

  • Target

    d3e2d8978a6639ebb9c5ee379dcfbbca

  • Size

    209KB

  • Sample

    240318-s52xwscg7x

  • MD5

    d3e2d8978a6639ebb9c5ee379dcfbbca

  • SHA1

    322430b9443eb95007fae8b90609e195b0418ca1

  • SHA256

    92b566ee7729b0937eb939acc3f81dbedd9775c74d2b4af71bff39c2840ee11a

  • SHA512

    f3c63ba1af02bc044aa41725c867910e8a568cfab037c0a9f8494a92a44bfc6a27d4814943ae429b102f9927ac5423aa16a57a118ee05e775a91526903cc280e

  • SSDEEP

    6144:7O/QJHZweEL/NOjCHm7FZZncphVabE5wKSDP99zBa77oNsKqqn:78QpZsKCaiphVabEDSDP99zBa/HKqQ

Malware Config

Targets

    • Target

      d3e2d8978a6639ebb9c5ee379dcfbbca

    • Size

      209KB

    • MD5

      d3e2d8978a6639ebb9c5ee379dcfbbca

    • SHA1

      322430b9443eb95007fae8b90609e195b0418ca1

    • SHA256

      92b566ee7729b0937eb939acc3f81dbedd9775c74d2b4af71bff39c2840ee11a

    • SHA512

      f3c63ba1af02bc044aa41725c867910e8a568cfab037c0a9f8494a92a44bfc6a27d4814943ae429b102f9927ac5423aa16a57a118ee05e775a91526903cc280e

    • SSDEEP

      6144:7O/QJHZweEL/NOjCHm7FZZncphVabE5wKSDP99zBa77oNsKqqn:78QpZsKCaiphVabEDSDP99zBa/HKqQ

    • Contacts a large (11404) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks