General

  • Target

    na.elf

  • Size

    66KB

  • Sample

    241010-hnnntswcjq

  • MD5

    2bc8fdb30c561d2fa0d96e5a4d14b0bb

  • SHA1

    6fc0ec8fa3b9b468130f5224db086febbb16e6aa

  • SHA256

    b48d3560388a23014805ad5f2518b5c965a902441255693234d4d70526f8084b

  • SHA512

    d08c6833eab5af484121ff1c9bf1c45e607701e29eba74a5bbb76241a5b5dafbfade8d427d10954efbbf9bc2585df7c6f6c2c2c1cb78fe0586c958de8329bc8f

  • SSDEEP

    768:BphYhwiqpvgrCSScSUXnZ8XKpf9Sd5N/NVQxtzJH0+HEc+8Yobue4mfphLBdJudd:FYTAgkYXnZ8HVWWlOfpudl2oN5/

Malware Config

Targets

    • Target

      na.elf

    • Size

      66KB

    • MD5

      2bc8fdb30c561d2fa0d96e5a4d14b0bb

    • SHA1

      6fc0ec8fa3b9b468130f5224db086febbb16e6aa

    • SHA256

      b48d3560388a23014805ad5f2518b5c965a902441255693234d4d70526f8084b

    • SHA512

      d08c6833eab5af484121ff1c9bf1c45e607701e29eba74a5bbb76241a5b5dafbfade8d427d10954efbbf9bc2585df7c6f6c2c2c1cb78fe0586c958de8329bc8f

    • SSDEEP

      768:BphYhwiqpvgrCSScSUXnZ8XKpf9Sd5N/NVQxtzJH0+HEc+8Yobue4mfphLBdJudd:FYTAgkYXnZ8HVWWlOfpudl2oN5/

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks