General

  • Target

    d602236ad7ba3906fbfed789c818213c

  • Size

    300KB

  • Sample

    240319-npwcysba36

  • MD5

    d602236ad7ba3906fbfed789c818213c

  • SHA1

    368f91be0cdd2016080d5b3e3eb1c9f9b09f8c17

  • SHA256

    e1b37e98480790e9fd213030a58f74574ee68ee46a265bbfc9f761767c71129e

  • SHA512

    d699df5bac90027f800b36d51bcc8c041435d1081048a8d4ad88283bffceb35b3499c54bec13d4024d5af2f6e4cc9276b6f3d8fe4d7cc710abc6d9aea387c94c

  • SSDEEP

    3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi

Malware Config

Targets

    • Target

      d602236ad7ba3906fbfed789c818213c

    • Size

      300KB

    • MD5

      d602236ad7ba3906fbfed789c818213c

    • SHA1

      368f91be0cdd2016080d5b3e3eb1c9f9b09f8c17

    • SHA256

      e1b37e98480790e9fd213030a58f74574ee68ee46a265bbfc9f761767c71129e

    • SHA512

      d699df5bac90027f800b36d51bcc8c041435d1081048a8d4ad88283bffceb35b3499c54bec13d4024d5af2f6e4cc9276b6f3d8fe4d7cc710abc6d9aea387c94c

    • SSDEEP

      3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xio:p3lOYoaja8xzx/0wsxzSi

    • Contacts a large (10977) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Patched UPX-packed file

      Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks