General

  • Target

    7RBLN_na.elf

  • Size

    86KB

  • Sample

    241010-hrjt2szhkb

  • MD5

    fd2e100d5eb1c1f9d4ba81241c43620b

  • SHA1

    8114ab62d5314edb40383dcd849e38656f5dd888

  • SHA256

    d7b0dce26bb6d14f8d8a1867b714dc289273ab78b87ce66ba97b244b0468a4ce

  • SHA512

    df352dcc3769b399138185f8e864a5d33fc8c0b62715e2f3cb85963047a2ca6f72ad3e3c89c1d9ea3ee54af53b510432eee6d09594b35e5f603461596bc1f247

  • SSDEEP

    1536:S4Ors/hxsJ9Uz6/2IUqjzO7nixoFdZSsJcLNtn:SfA/hxsJCzCXUtFdFOn

Malware Config

Targets

    • Target

      7RBLN_na.elf

    • Size

      86KB

    • MD5

      fd2e100d5eb1c1f9d4ba81241c43620b

    • SHA1

      8114ab62d5314edb40383dcd849e38656f5dd888

    • SHA256

      d7b0dce26bb6d14f8d8a1867b714dc289273ab78b87ce66ba97b244b0468a4ce

    • SHA512

      df352dcc3769b399138185f8e864a5d33fc8c0b62715e2f3cb85963047a2ca6f72ad3e3c89c1d9ea3ee54af53b510432eee6d09594b35e5f603461596bc1f247

    • SSDEEP

      1536:S4Ors/hxsJ9Uz6/2IUqjzO7nixoFdZSsJcLNtn:SfA/hxsJCzCXUtFdFOn

    • Contacts a large (20380) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes system logs

      Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Deletes log files

      Deletes log files on the system.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks