General

  • Target

    na.elf

  • Size

    61KB

  • Sample

    241010-hnnntszfrf

  • MD5

    d155adcf6e6e692f242351fb6b71e7fb

  • SHA1

    f0b5333c7c76d2837c5389e9854c3432f11ae589

  • SHA256

    d4a6b428adbbee7ef528dd595fe44bd448e07c67bf201aaa771f5343104c3621

  • SHA512

    d8a6e657e2d8177193818eae54c18d1d710876b85caadcd3f54585db150549b13482b1bc283499aa2767615479202ab91a2661bff5cb0d5e5aabcc2e5abbdee2

  • SSDEEP

    1536:nEng1PtXEtN8zHZJ3ELUdcQ4E12N5nDoEigvFUm1R:3FtXEtwJRd1xEvFUm1R

Malware Config

Targets

    • Target

      na.elf

    • Size

      61KB

    • MD5

      d155adcf6e6e692f242351fb6b71e7fb

    • SHA1

      f0b5333c7c76d2837c5389e9854c3432f11ae589

    • SHA256

      d4a6b428adbbee7ef528dd595fe44bd448e07c67bf201aaa771f5343104c3621

    • SHA512

      d8a6e657e2d8177193818eae54c18d1d710876b85caadcd3f54585db150549b13482b1bc283499aa2767615479202ab91a2661bff5cb0d5e5aabcc2e5abbdee2

    • SSDEEP

      1536:nEng1PtXEtN8zHZJ3ELUdcQ4E12N5nDoEigvFUm1R:3FtXEtwJRd1xEvFUm1R

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks