General

  • Target

    mips.crdownload

  • Size

    158KB

  • Sample

    240708-268lhawfjb

  • MD5

    37e6b4d93ace5aa57958fdb1a0c2d167

  • SHA1

    ed21d4dcb236668523c67dac83158a50611c3819

  • SHA256

    cf0f91ffe3af5f43475503df6f29970d4e5afc0643ff56ffc5efabf5ad1b6806

  • SHA512

    38bdd4c46bd65c449a3be98a6f7bd3ac50578c588df964a279e1f3c9bb15d56cc1063ea357b4c838306c1ea4ec2a03a249e0ae23eb98dbdc9c9ec56883494e19

  • SSDEEP

    3072:qtcVJ5G24rM7rFcLpsB4QIfgrUMnXNhO2qJCh5tdtczy9RP3Ql51eAFb1laWh3:qSg24I7rFxdIfgrUfsd0y9RP3Ql51ZFB

Score
9/10

Malware Config

Targets

    • Target

      mips.crdownload

    • Size

      158KB

    • MD5

      37e6b4d93ace5aa57958fdb1a0c2d167

    • SHA1

      ed21d4dcb236668523c67dac83158a50611c3819

    • SHA256

      cf0f91ffe3af5f43475503df6f29970d4e5afc0643ff56ffc5efabf5ad1b6806

    • SHA512

      38bdd4c46bd65c449a3be98a6f7bd3ac50578c588df964a279e1f3c9bb15d56cc1063ea357b4c838306c1ea4ec2a03a249e0ae23eb98dbdc9c9ec56883494e19

    • SSDEEP

      3072:qtcVJ5G24rM7rFcLpsB4QIfgrUMnXNhO2qJCh5tdtczy9RP3Ql51eAFb1laWh3:qSg24I7rFxdIfgrUfsd0y9RP3Ql51ZFB

    Score
    9/10
    • Contacts a large (462741) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

System Information Discovery

1
T1082

Tasks