General
-
Target
linux_mipsel_softfloat.elf
-
Size
5.6MB
-
Sample
241027-2zd4baskbk
-
MD5
6a2b3d8543d913158f65c0721b8e1ddf
-
SHA1
9f82c3e1aa34b39b9ef47cfca1aa74b3652bc332
-
SHA256
58057558451548f7cda81b67e915f7143683e98ac7a938d78ec620140c9991a6
-
SHA512
2d4fd26550989b16cf1ef5e199c66866c5a87b0ee98b762184f1ff264edfe030cac448059d49c371b09cdd70e0b31eb8242dbfb3b7388f4679198d013c000001
-
SSDEEP
49152:+RxVVRFMTwdupkYzfgh7rxQ2USaU85Jbq1rQcR6VYv0VF1:
Behavioral task
behavioral1
Sample
linux_mipsel_softfloat.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Targets
-
-
Target
linux_mipsel_softfloat.elf
-
Size
5.6MB
-
MD5
6a2b3d8543d913158f65c0721b8e1ddf
-
SHA1
9f82c3e1aa34b39b9ef47cfca1aa74b3652bc332
-
SHA256
58057558451548f7cda81b67e915f7143683e98ac7a938d78ec620140c9991a6
-
SHA512
2d4fd26550989b16cf1ef5e199c66866c5a87b0ee98b762184f1ff264edfe030cac448059d49c371b09cdd70e0b31eb8242dbfb3b7388f4679198d013c000001
-
SSDEEP
49152:+RxVVRFMTwdupkYzfgh7rxQ2USaU85Jbq1rQcR6VYv0VF1:
-
Executes dropped EXE
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2XDG Autostart Entries
1Boot or Logon Initialization Scripts
1RC Scripts
1Create or Modify System Process
1Systemd Service
1