General

  • Target

    7cabc7d9ac4490fb547415bdf7269c33.elf

  • Size

    590KB

  • Sample

    240424-qfg53sae41

  • MD5

    7cabc7d9ac4490fb547415bdf7269c33

  • SHA1

    ac72e44f7e7a30727d356b3c5e00317d09ad94e9

  • SHA256

    ed6964fb655c02b74298d9b1a979921abb3dfd42565084053593123af9259f79

  • SHA512

    4e5b86721e06d57e465c2b5353c9427c600f4896b1b073ab889f1f5c36574ed3326c7d2038585106fd4226db33e5f7d252c921a7e5646d70a1e30d5bec0e56e5

  • SSDEEP

    6144:PnRWqReH3BRzqfMC5fuUQh8+Qk8jVJntQf2Avz156Vmw3lgUekJGmOa2j1DluC9s:5UJz9emvo70Tlu0qXK0

Malware Config

Targets

    • Target

      7cabc7d9ac4490fb547415bdf7269c33.elf

    • Size

      590KB

    • MD5

      7cabc7d9ac4490fb547415bdf7269c33

    • SHA1

      ac72e44f7e7a30727d356b3c5e00317d09ad94e9

    • SHA256

      ed6964fb655c02b74298d9b1a979921abb3dfd42565084053593123af9259f79

    • SHA512

      4e5b86721e06d57e465c2b5353c9427c600f4896b1b073ab889f1f5c36574ed3326c7d2038585106fd4226db33e5f7d252c921a7e5646d70a1e30d5bec0e56e5

    • SSDEEP

      6144:PnRWqReH3BRzqfMC5fuUQh8+Qk8jVJntQf2Avz156Vmw3lgUekJGmOa2j1DluC9s:5UJz9emvo70Tlu0qXK0

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Boot or Logon Autostart Execution

2
T1547

Hijack Execution Flow

1
T1574

Privilege Escalation

Scheduled Task/Job

1
T1053

Boot or Logon Autostart Execution

2
T1547

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

System Information Discovery

1
T1082

Tasks