General
-
Target
na.elf
-
Size
125KB
-
Sample
241010-hpbewswcnm
-
MD5
2b0caf52e5e7d8967ce6ad262f194966
-
SHA1
71cef25f6bc45bdecd8ba77ec5c18a7795cc4bd4
-
SHA256
26a240e366d95b7fd6b58e1ac79304334b30a910415a224c31f585f7b49cfaa2
-
SHA512
b5d037a7caeeeabbcfc05a9b62c12622870f6d61a3b916ac80f61b0eab22dc274df7d02e8c4ff7334dc9074c17307c4a52ca8c38f1ff1c89f58f7f1ccea7b52d
-
SSDEEP
1536:AmbdXGuJxQ1lmoGWGO/+9MBLVKvyPXgQXE9ZTUdY7oew11S07HI:A4XBJxQT5Ge/+ubgYE9G+fwnS07
Static task
static1
Behavioral task
behavioral1
Sample
na.elf
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
na.elf
-
Size
125KB
-
MD5
2b0caf52e5e7d8967ce6ad262f194966
-
SHA1
71cef25f6bc45bdecd8ba77ec5c18a7795cc4bd4
-
SHA256
26a240e366d95b7fd6b58e1ac79304334b30a910415a224c31f585f7b49cfaa2
-
SHA512
b5d037a7caeeeabbcfc05a9b62c12622870f6d61a3b916ac80f61b0eab22dc274df7d02e8c4ff7334dc9074c17307c4a52ca8c38f1ff1c89f58f7f1ccea7b52d
-
SSDEEP
1536:AmbdXGuJxQ1lmoGWGO/+9MBLVKvyPXgQXE9ZTUdY7oew11S07HI:A4XBJxQT5Ge/+ubgYE9G+fwnS07
-
Contacts a large (40810) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-