General

  • Target

    3fa08c18fff1f6d0e8fa64e93adfe087.elf

  • Size

    144KB

  • Sample

    240627-yfs7cazbpk

  • MD5

    3fa08c18fff1f6d0e8fa64e93adfe087

  • SHA1

    9f641165a3379243d385efa0cb2ea19a5872bb41

  • SHA256

    18dfd835eb3fb6b2010d762603a567bc28e666c9611b99bb50c3dc51a75f8a50

  • SHA512

    926f4a4edffb73420956ff4683ee5755cb82b6664f172fe10ef02fa6d0387111d89b9c67ad1fa8d9626779890750f437152f229f204d010604eb9b7f1cd71cbe

  • SSDEEP

    3072:h9DcOnHfXlH4oQTpY+F5aQV+N9xFgipMLbImFa1RIiZhZn:hZNmTm+F5BETxFgipMLUmFa3/Zn

Score
9/10

Malware Config

Targets

    • Target

      3fa08c18fff1f6d0e8fa64e93adfe087.elf

    • Size

      144KB

    • MD5

      3fa08c18fff1f6d0e8fa64e93adfe087

    • SHA1

      9f641165a3379243d385efa0cb2ea19a5872bb41

    • SHA256

      18dfd835eb3fb6b2010d762603a567bc28e666c9611b99bb50c3dc51a75f8a50

    • SHA512

      926f4a4edffb73420956ff4683ee5755cb82b6664f172fe10ef02fa6d0387111d89b9c67ad1fa8d9626779890750f437152f229f204d010604eb9b7f1cd71cbe

    • SSDEEP

      3072:h9DcOnHfXlH4oQTpY+F5aQV+N9xFgipMLbImFa1RIiZhZn:hZNmTm+F5BETxFgipMLUmFa3/Zn

    Score
    9/10
    • Contacts a large (534199) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

System Information Discovery

1
T1082

Tasks