General
-
Target
d602236ad7ba3906fbfed789c818213c
-
Size
300KB
-
Sample
240319-npwcysba36
-
MD5
d602236ad7ba3906fbfed789c818213c
-
SHA1
368f91be0cdd2016080d5b3e3eb1c9f9b09f8c17
-
SHA256
e1b37e98480790e9fd213030a58f74574ee68ee46a265bbfc9f761767c71129e
-
SHA512
d699df5bac90027f800b36d51bcc8c041435d1081048a8d4ad88283bffceb35b3499c54bec13d4024d5af2f6e4cc9276b6f3d8fe4d7cc710abc6d9aea387c94c
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi
Behavioral task
behavioral1
Sample
d602236ad7ba3906fbfed789c818213c
Resource
debian9-mipsbe-20240226-en
Malware Config
Targets
-
-
Target
d602236ad7ba3906fbfed789c818213c
-
Size
300KB
-
MD5
d602236ad7ba3906fbfed789c818213c
-
SHA1
368f91be0cdd2016080d5b3e3eb1c9f9b09f8c17
-
SHA256
e1b37e98480790e9fd213030a58f74574ee68ee46a265bbfc9f761767c71129e
-
SHA512
d699df5bac90027f800b36d51bcc8c041435d1081048a8d4ad88283bffceb35b3499c54bec13d4024d5af2f6e4cc9276b6f3d8fe4d7cc710abc6d9aea387c94c
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi
Score9/10-
Contacts a large (10977) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Patched UPX-packed file
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-
Writes file to system bin folder
-