General
-
Target
713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771.elf
-
Size
2.3MB
-
Sample
240323-rhkjnabb4z
-
MD5
171d2a50c6d7e69281d1c3ef98d510f2
-
SHA1
322db4ca435004a127acd4171cc52be9edaf5338
-
SHA256
713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771
-
SHA512
2226d1a5e9c8a2920fa8d327b53e10f135e9b30c8c3d1e7fbb3a59a51df782f106f41f60ad8140a1de4a81ef6b230418126ffb24bd75eab3c3a298ada2f58913
-
SSDEEP
49152:bC9tUNrb/T7vO90dL3BmAFd4A64nsfJcm9M3YJIpgfDVw0ksgg778GzvyKYUcTD1:bzcM4IyEWyKP
Static task
static1
Behavioral task
behavioral1
Sample
713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771.elf
Resource
ubuntu2004-amd64-20240221-en
Malware Config
Extracted
/MEag_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771.elf
-
Size
2.3MB
-
MD5
171d2a50c6d7e69281d1c3ef98d510f2
-
SHA1
322db4ca435004a127acd4171cc52be9edaf5338
-
SHA256
713b699c04f21000fca981e698e1046d4595f423bd5741d712fd7e0bc358c771
-
SHA512
2226d1a5e9c8a2920fa8d327b53e10f135e9b30c8c3d1e7fbb3a59a51df782f106f41f60ad8140a1de4a81ef6b230418126ffb24bd75eab3c3a298ada2f58913
-
SSDEEP
49152:bC9tUNrb/T7vO90dL3BmAFd4A64nsfJcm9M3YJIpgfDVw0ksgg778GzvyKYUcTD1:bzcM4IyEWyKP
Score10/10-
Deletes itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Deletes log files
Deletes log files on the system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads CPU attributes
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-
Reads network interface configuration
Fetches information about one or more active network interfaces.
-