General

  • Target

    88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692.elf

  • Size

    78KB

  • Sample

    241029-c5ejlatcpr

  • MD5

    0d28778c12ca8187d7c25a39cbf139b5

  • SHA1

    d6acf3d900bfa3cd334bbe4fb077aef271ef9b7b

  • SHA256

    88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692

  • SHA512

    9ecdfd171809eee4b80289f341c1bf7a432b929e9eb5dd2659ff828ed0921476cfd79d6c0f475b04bf06d4fc55adb8bc6413a349b203ec5065e0182cac2134b9

  • SSDEEP

    1536:Adhb3BXcohEINgqisu8dCfv2xWuWO7Mb7Ndb7z22fsPyA5HfrnI8sR4:Ibx/h2mSv2xWuYxA5/rnIy

Malware Config

Targets

    • Target

      88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692.elf

    • Size

      78KB

    • MD5

      0d28778c12ca8187d7c25a39cbf139b5

    • SHA1

      d6acf3d900bfa3cd334bbe4fb077aef271ef9b7b

    • SHA256

      88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692

    • SHA512

      9ecdfd171809eee4b80289f341c1bf7a432b929e9eb5dd2659ff828ed0921476cfd79d6c0f475b04bf06d4fc55adb8bc6413a349b203ec5065e0182cac2134b9

    • SSDEEP

      1536:Adhb3BXcohEINgqisu8dCfv2xWuWO7Mb7Ndb7z22fsPyA5HfrnI8sR4:Ibx/h2mSv2xWuYxA5/rnIy

    • Contacts a large (89783) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks