General
-
Target
240830-1dgrmsxfkr_pw_infected.zip
-
Size
145KB
-
Sample
240830-1frdvsxglk
-
MD5
7211d0f5b5998cd419afc932adbbc596
-
SHA1
e7300e17360d16e6c6721e79c103b72e389befd6
-
SHA256
bd7ece4dc5ae0a02380aae181da4b27fffd793356e324ba74ba0a961e2abfb84
-
SHA512
82c9858b052d3fe288ae9f5a7e019c929e181d7483cfe2388e801285e0ee4ec0f2abab9aa2a16316859dee4b1b50845a0f8e1e08694a4bc6240021001c4c0d5b
-
SSDEEP
3072:Ac0g5KYCZWjvD59RK767dXrNrn40sd2M5wYIAq5tzvk6LefvAKaC6vTu:Ag5KbAvD59RK7ilrNrbwOAq5tLkqe3AG
Static task
static1
Behavioral task
behavioral1
Sample
bin.sh
Resource
debian12-armhf-20240221-en
Malware Config
Targets
-
-
Target
bin.sh
-
Size
300KB
-
MD5
eec5c6c219535fba3a0492ea8118b397
-
SHA1
292559e94f1c04b7d0c65d4a01bbbc5dc1ff6f21
-
SHA256
12013662c71da69de977c04cd7021f13a70cf7bed4ca6c82acbc100464d4b0ef
-
SHA512
3482c8324a18302f0f37b6e23ed85f24fff9f50bb568d8fd7461bf57f077a7c592f7a88bb2e1c398699958946d87bb93ab744d13a0003f9b879c15e6471f7400
-
SSDEEP
6144:T2s/gAWuboqsJ9xcJxspJBqQgTuaJZRhVabE5wKSDP99zBa77oNsKqqfPqOJ:T2s/bW+UmJqBxAuaPRhVabEDSDP99zBT
Score9/10-
Contacts a large (7122) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads system routing table
Gets active network interfaces from /proc virtual filesystem.
-
Write file to user bin folder
-
Writes file to system bin folder
-
Modifies Bash startup script
-