General

  • Target

    belks.arm7.elf

  • Size

    146KB

  • Sample

    241029-xr4a1szkck

  • MD5

    3cd73d3a909a4567ca8f1e96b6bcbd61

  • SHA1

    96dfe0850bba93afbfd451a2a8787e044495c7ed

  • SHA256

    e0b31a3163864fc43a18fb14cb556b2d3054e635d4c4b3b58dfb4b7f60d24e83

  • SHA512

    69698ed70dcd6a34a6898b59c9fec2366a939f3291ba8e4da5aa84294a8556140841a633210ceb320050dc0abe4b148b7eb57ca23fa3110f990aa2be70b62a49

  • SSDEEP

    3072:rSvWfz6ZxE94JBpBG55iIo6Kplb+qz1ziieBvTIu0kcWrXZOCM/92LQLh:+vWfz6ZxE9QpBGDiIulfiieBvTSkZXZk

Malware Config

Targets

    • Target

      belks.arm7.elf

    • Size

      146KB

    • MD5

      3cd73d3a909a4567ca8f1e96b6bcbd61

    • SHA1

      96dfe0850bba93afbfd451a2a8787e044495c7ed

    • SHA256

      e0b31a3163864fc43a18fb14cb556b2d3054e635d4c4b3b58dfb4b7f60d24e83

    • SHA512

      69698ed70dcd6a34a6898b59c9fec2366a939f3291ba8e4da5aa84294a8556140841a633210ceb320050dc0abe4b148b7eb57ca23fa3110f990aa2be70b62a49

    • SSDEEP

      3072:rSvWfz6ZxE94JBpBG55iIo6Kplb+qz1ziieBvTIu0kcWrXZOCM/92LQLh:+vWfz6ZxE9QpBGDiIulfiieBvTSkZXZk

    • Contacts a large (250192) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks