General
-
Target
d3e2d8978a6639ebb9c5ee379dcfbbca
-
Size
209KB
-
Sample
240318-s52xwscg7x
-
MD5
d3e2d8978a6639ebb9c5ee379dcfbbca
-
SHA1
322430b9443eb95007fae8b90609e195b0418ca1
-
SHA256
92b566ee7729b0937eb939acc3f81dbedd9775c74d2b4af71bff39c2840ee11a
-
SHA512
f3c63ba1af02bc044aa41725c867910e8a568cfab037c0a9f8494a92a44bfc6a27d4814943ae429b102f9927ac5423aa16a57a118ee05e775a91526903cc280e
-
SSDEEP
6144:7O/QJHZweEL/NOjCHm7FZZncphVabE5wKSDP99zBa77oNsKqqn:78QpZsKCaiphVabEDSDP99zBa/HKqQ
Behavioral task
behavioral1
Sample
d3e2d8978a6639ebb9c5ee379dcfbbca
Resource
debian9-mipsbe-20240226-en
Malware Config
Targets
-
-
Target
d3e2d8978a6639ebb9c5ee379dcfbbca
-
Size
209KB
-
MD5
d3e2d8978a6639ebb9c5ee379dcfbbca
-
SHA1
322430b9443eb95007fae8b90609e195b0418ca1
-
SHA256
92b566ee7729b0937eb939acc3f81dbedd9775c74d2b4af71bff39c2840ee11a
-
SHA512
f3c63ba1af02bc044aa41725c867910e8a568cfab037c0a9f8494a92a44bfc6a27d4814943ae429b102f9927ac5423aa16a57a118ee05e775a91526903cc280e
-
SSDEEP
6144:7O/QJHZweEL/NOjCHm7FZZncphVabE5wKSDP99zBa77oNsKqqn:78QpZsKCaiphVabEDSDP99zBa/HKqQ
Score9/10-
Contacts a large (11404) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Patched UPX-packed file
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-
Writes file to system bin folder
-