General
-
Target
3e2d5702a3cb19ba16485e490900cb2d.elf
-
Size
55KB
-
Sample
240704-mntmaswcjp
-
MD5
3e2d5702a3cb19ba16485e490900cb2d
-
SHA1
cb819654d28a6a106c10ecf94063ba0347d81973
-
SHA256
04ade62e6bb55162155da44343b58033d035edc12bc352babbddf26039d20ae0
-
SHA512
dd7551e8e735e98de22e1a7aa91328a935faf454d285fa5bc45ca3c792206360aba3a560ff5d9afefff29bd9fce2836b8858a2f104468946c88e7124010fd89e
-
SSDEEP
1536:1q0RtI+utAhAyb3n+NcR9B7WcJtgcvDgg0nI8sR:1q0eCn+rO0nI
Static task
static1
Behavioral task
behavioral1
Sample
3e2d5702a3cb19ba16485e490900cb2d.elf
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
3e2d5702a3cb19ba16485e490900cb2d.elf
-
Size
55KB
-
MD5
3e2d5702a3cb19ba16485e490900cb2d
-
SHA1
cb819654d28a6a106c10ecf94063ba0347d81973
-
SHA256
04ade62e6bb55162155da44343b58033d035edc12bc352babbddf26039d20ae0
-
SHA512
dd7551e8e735e98de22e1a7aa91328a935faf454d285fa5bc45ca3c792206360aba3a560ff5d9afefff29bd9fce2836b8858a2f104468946c88e7124010fd89e
-
SSDEEP
1536:1q0RtI+utAhAyb3n+NcR9B7WcJtgcvDgg0nI8sR:1q0eCn+rO0nI
Score9/10-
Contacts a large (4388) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-