General
-
Target
cde84a66bbde730ce4e68578e1f14269.elf
-
Size
134KB
-
Sample
240427-k2sk2sfc45
-
MD5
cde84a66bbde730ce4e68578e1f14269
-
SHA1
d31a098ed5c63f4e83b6e1bff889c5fe02dea09e
-
SHA256
a55ff31d25572e9997f22f304ff29a590ef77fcab06e68c1fbb5aa6f864dbdb8
-
SHA512
125af26879db9649f58b6aa37463960f139fe327a798dcf8d8add69d37debb217f0ea3648f9f71daba9e196efa8a9cc0dd7319aa88d292f03fced8c3ad953265
-
SSDEEP
3072:tjqR/Cs6/LWRLxiNoV/6MrceQAt0bJnIjnhNHM/9v:tjqos6/LW14OV/6MrcPAEmnhxM/9v
Static task
static1
Behavioral task
behavioral1
Sample
cde84a66bbde730ce4e68578e1f14269.elf
Resource
debian9-armhf-20240226-en
Malware Config
Targets
-
-
Target
cde84a66bbde730ce4e68578e1f14269.elf
-
Size
134KB
-
MD5
cde84a66bbde730ce4e68578e1f14269
-
SHA1
d31a098ed5c63f4e83b6e1bff889c5fe02dea09e
-
SHA256
a55ff31d25572e9997f22f304ff29a590ef77fcab06e68c1fbb5aa6f864dbdb8
-
SHA512
125af26879db9649f58b6aa37463960f139fe327a798dcf8d8add69d37debb217f0ea3648f9f71daba9e196efa8a9cc0dd7319aa88d292f03fced8c3ad953265
-
SSDEEP
3072:tjqR/Cs6/LWRLxiNoV/6MrceQAt0bJnIjnhNHM/9v:tjqos6/LW14OV/6MrcPAEmnhxM/9v
Score9/10-
Contacts a large (25153) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-