General
-
Target
na.elf
-
Size
61KB
-
Sample
241010-hnnntszfrf
-
MD5
d155adcf6e6e692f242351fb6b71e7fb
-
SHA1
f0b5333c7c76d2837c5389e9854c3432f11ae589
-
SHA256
d4a6b428adbbee7ef528dd595fe44bd448e07c67bf201aaa771f5343104c3621
-
SHA512
d8a6e657e2d8177193818eae54c18d1d710876b85caadcd3f54585db150549b13482b1bc283499aa2767615479202ab91a2661bff5cb0d5e5aabcc2e5abbdee2
-
SSDEEP
1536:nEng1PtXEtN8zHZJ3ELUdcQ4E12N5nDoEigvFUm1R:3FtXEtwJRd1xEvFUm1R
Static task
static1
Behavioral task
behavioral1
Sample
na.elf
Resource
debian12-armhf-20240418-en
Malware Config
Targets
-
-
Target
na.elf
-
Size
61KB
-
MD5
d155adcf6e6e692f242351fb6b71e7fb
-
SHA1
f0b5333c7c76d2837c5389e9854c3432f11ae589
-
SHA256
d4a6b428adbbee7ef528dd595fe44bd448e07c67bf201aaa771f5343104c3621
-
SHA512
d8a6e657e2d8177193818eae54c18d1d710876b85caadcd3f54585db150549b13482b1bc283499aa2767615479202ab91a2661bff5cb0d5e5aabcc2e5abbdee2
-
SSDEEP
1536:nEng1PtXEtN8zHZJ3ELUdcQ4E12N5nDoEigvFUm1R:3FtXEtwJRd1xEvFUm1R
Score9/10-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-