General

  • Target

    3e2a4502d0ff6aca1c5494747103750a48b9a951f9cc841ffdcd5d13114d24bd.elf

  • Size

    70KB

  • Sample

    240419-bl5e8scc79

  • MD5

    3adb3a4bf4939d9c0b2510d12fd91abb

  • SHA1

    9b2ca276cfe51cf44c4625b690884b523c4f8628

  • SHA256

    3e2a4502d0ff6aca1c5494747103750a48b9a951f9cc841ffdcd5d13114d24bd

  • SHA512

    211abfd7ed7ccff86daf6ce24eeaf0c7da8d3caa1ebdb2bc865eac0185b657b650656c6b6a0cda2fd2da113cb7dd663d64b818bdfe5398d7858a50d01702e56d

  • SSDEEP

    768:b03j8jEJbSNYSjsuIbF7eqBMd67ZdCem94Np8kX8wCiqpUMR644oAw75nUMI3Zkn:b0wjEJOLsuIbF7ehaCe14gSb5nW3Gvf

Score
7/10

Malware Config

Targets

    • Target

      3e2a4502d0ff6aca1c5494747103750a48b9a951f9cc841ffdcd5d13114d24bd.elf

    • Size

      70KB

    • MD5

      3adb3a4bf4939d9c0b2510d12fd91abb

    • SHA1

      9b2ca276cfe51cf44c4625b690884b523c4f8628

    • SHA256

      3e2a4502d0ff6aca1c5494747103750a48b9a951f9cc841ffdcd5d13114d24bd

    • SHA512

      211abfd7ed7ccff86daf6ce24eeaf0c7da8d3caa1ebdb2bc865eac0185b657b650656c6b6a0cda2fd2da113cb7dd663d64b818bdfe5398d7858a50d01702e56d

    • SSDEEP

      768:b03j8jEJbSNYSjsuIbF7eqBMd67ZdCem94Np8kX8wCiqpUMR644oAw75nUMI3Zkn:b0wjEJOLsuIbF7ehaCe14gSb5nW3Gvf

    Score
    7/10
    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks