General
-
Target
7RBLN_na.elf
-
Size
86KB
-
Sample
241010-hrjt2szhkb
-
MD5
fd2e100d5eb1c1f9d4ba81241c43620b
-
SHA1
8114ab62d5314edb40383dcd849e38656f5dd888
-
SHA256
d7b0dce26bb6d14f8d8a1867b714dc289273ab78b87ce66ba97b244b0468a4ce
-
SHA512
df352dcc3769b399138185f8e864a5d33fc8c0b62715e2f3cb85963047a2ca6f72ad3e3c89c1d9ea3ee54af53b510432eee6d09594b35e5f603461596bc1f247
-
SSDEEP
1536:S4Ors/hxsJ9Uz6/2IUqjzO7nixoFdZSsJcLNtn:SfA/hxsJCzCXUtFdFOn
Static task
static1
Behavioral task
behavioral1
Sample
7RBLN_na.elf
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
7RBLN_na.elf
-
Size
86KB
-
MD5
fd2e100d5eb1c1f9d4ba81241c43620b
-
SHA1
8114ab62d5314edb40383dcd849e38656f5dd888
-
SHA256
d7b0dce26bb6d14f8d8a1867b714dc289273ab78b87ce66ba97b244b0468a4ce
-
SHA512
df352dcc3769b399138185f8e864a5d33fc8c0b62715e2f3cb85963047a2ca6f72ad3e3c89c1d9ea3ee54af53b510432eee6d09594b35e5f603461596bc1f247
-
SSDEEP
1536:S4Ors/hxsJ9Uz6/2IUqjzO7nixoFdZSsJcLNtn:SfA/hxsJCzCXUtFdFOn
-
Contacts a large (20380) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-