General

  • Target

    QGUT2_na.elf

  • Size

    130KB

  • Sample

    241010-lfw7saydkm

  • MD5

    17e4dae04b6c95340a4df08ebde65336

  • SHA1

    7aa049001870a285253f4565dbab444ba6cc403f

  • SHA256

    1bf7b9aac74f39cae6ee8ae25bbb364ab3f382edb507709be8e5c74f57801e7e

  • SHA512

    69efedbc5fc5f047b39577c3f6fc4aab451c42ae44067e7d3a77d178ca0f2b5ef70751b7d32436d0be1bbf855ccbeeb27ab8ef23ec554217d5ef9c4eb33886d0

  • SSDEEP

    1536:i/UodEcbuJuMbEOoqWeBq1gfjeH73ZSgcZ0pv5ZH3einUb1/ENZYHw:i/rEcqJuMghqFBqKHg60pv5hHCBENZY

Malware Config

Targets

    • Target

      QGUT2_na.elf

    • Size

      130KB

    • MD5

      17e4dae04b6c95340a4df08ebde65336

    • SHA1

      7aa049001870a285253f4565dbab444ba6cc403f

    • SHA256

      1bf7b9aac74f39cae6ee8ae25bbb364ab3f382edb507709be8e5c74f57801e7e

    • SHA512

      69efedbc5fc5f047b39577c3f6fc4aab451c42ae44067e7d3a77d178ca0f2b5ef70751b7d32436d0be1bbf855ccbeeb27ab8ef23ec554217d5ef9c4eb33886d0

    • SSDEEP

      1536:i/UodEcbuJuMbEOoqWeBq1gfjeH73ZSgcZ0pv5ZH3einUb1/ENZYHw:i/rEcqJuMghqFBqKHg60pv5hHCBENZY

    • Contacts a large (213384) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes system logs

      Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Deletes log files

      Deletes log files on the system.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks