General

  • Target

    5e5040ce07839ddc43898c164e5759e0.elf

  • Size

    132KB

  • Sample

    240627-yktcxaxelb

  • MD5

    5e5040ce07839ddc43898c164e5759e0

  • SHA1

    a6c37b1dd92eb44ea65a2bf176ee224c5df741d3

  • SHA256

    bdf0115edf3129c7dc739b5eb2e8b0aaf06f3b35037598d161d83008a78b1546

  • SHA512

    143c0b47ce03103480e2dfee91c62bec5a9dc04edf9c32853e3c501fbc1ebf13ed00490381fbb8ee5dbbe513951596a2345a79241e599d8169c412160a351279

  • SSDEEP

    3072:bFyUW39WZwTaM0wGHebw81mx8iaw48waKyg9PdjMG:bg9WscHUw8wmVw4laAdjMG

Score
9/10

Malware Config

Targets

    • Target

      5e5040ce07839ddc43898c164e5759e0.elf

    • Size

      132KB

    • MD5

      5e5040ce07839ddc43898c164e5759e0

    • SHA1

      a6c37b1dd92eb44ea65a2bf176ee224c5df741d3

    • SHA256

      bdf0115edf3129c7dc739b5eb2e8b0aaf06f3b35037598d161d83008a78b1546

    • SHA512

      143c0b47ce03103480e2dfee91c62bec5a9dc04edf9c32853e3c501fbc1ebf13ed00490381fbb8ee5dbbe513951596a2345a79241e599d8169c412160a351279

    • SSDEEP

      3072:bFyUW39WZwTaM0wGHebw81mx8iaw48waKyg9PdjMG:bg9WscHUw8wmVw4laAdjMG

    Score
    9/10
    • Contacts a large (531633) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

System Information Discovery

1
T1082

Tasks