General
-
Target
na.elf
-
Size
66KB
-
Sample
241010-hnnntswcjq
-
MD5
2bc8fdb30c561d2fa0d96e5a4d14b0bb
-
SHA1
6fc0ec8fa3b9b468130f5224db086febbb16e6aa
-
SHA256
b48d3560388a23014805ad5f2518b5c965a902441255693234d4d70526f8084b
-
SHA512
d08c6833eab5af484121ff1c9bf1c45e607701e29eba74a5bbb76241a5b5dafbfade8d427d10954efbbf9bc2585df7c6f6c2c2c1cb78fe0586c958de8329bc8f
-
SSDEEP
768:BphYhwiqpvgrCSScSUXnZ8XKpf9Sd5N/NVQxtzJH0+HEc+8Yobue4mfphLBdJudd:FYTAgkYXnZ8HVWWlOfpudl2oN5/
Static task
static1
Behavioral task
behavioral1
Sample
na.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Targets
-
-
Target
na.elf
-
Size
66KB
-
MD5
2bc8fdb30c561d2fa0d96e5a4d14b0bb
-
SHA1
6fc0ec8fa3b9b468130f5224db086febbb16e6aa
-
SHA256
b48d3560388a23014805ad5f2518b5c965a902441255693234d4d70526f8084b
-
SHA512
d08c6833eab5af484121ff1c9bf1c45e607701e29eba74a5bbb76241a5b5dafbfade8d427d10954efbbf9bc2585df7c6f6c2c2c1cb78fe0586c958de8329bc8f
-
SSDEEP
768:BphYhwiqpvgrCSScSUXnZ8XKpf9Sd5N/NVQxtzJH0+HEc+8Yobue4mfphLBdJudd:FYTAgkYXnZ8HVWWlOfpudl2oN5/
Score9/10-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-