General

  • Target

    belks.mips.elf

  • Size

    91KB

  • Sample

    241029-xr4a1syaqg

  • MD5

    136dd80aed610d45bbe9449a770b1571

  • SHA1

    dbcf3f00cb344527c39d990f27d3fee563630a75

  • SHA256

    b08b58acb44d6d8fd3c188b2218e17d62b9a13bef589a728beab257a0a07064d

  • SHA512

    f3aeffab5b4199c0cb0d34578c274dde3e286b49f307e075af6a9313c6fe69583f80c8ae15e10238fe27c7d4fc3a82cec5b18f3715eda4c2ae0ffe439d6bde7b

  • SSDEEP

    1536:r7bil4kcwdrxb4+ba5vRE/ENLnz13ugYnTFR+LHuKxgL+Pn9G:bilzxbVMQEdnz1+g4R+LHuKCqc

Malware Config

Targets

    • Target

      belks.mips.elf

    • Size

      91KB

    • MD5

      136dd80aed610d45bbe9449a770b1571

    • SHA1

      dbcf3f00cb344527c39d990f27d3fee563630a75

    • SHA256

      b08b58acb44d6d8fd3c188b2218e17d62b9a13bef589a728beab257a0a07064d

    • SHA512

      f3aeffab5b4199c0cb0d34578c274dde3e286b49f307e075af6a9313c6fe69583f80c8ae15e10238fe27c7d4fc3a82cec5b18f3715eda4c2ae0ffe439d6bde7b

    • SSDEEP

      1536:r7bil4kcwdrxb4+ba5vRE/ENLnz13ugYnTFR+LHuKxgL+Pn9G:bilzxbVMQEdnz1+g4R+LHuKCqc

    • Contacts a large (132036) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks