General

  • Target

    belks.x86.elf

  • Size

    64KB

  • Sample

    241029-xr4lsayara

  • MD5

    a7e3298f28b271d5ee7eb6a6d271b4b3

  • SHA1

    a5b783060f6d03f4270806ff978301c092c7bc90

  • SHA256

    a550845280ea8fdc0880af246afe056162034152be4ec895594062ade43f7f7b

  • SHA512

    b1309f20fa88bfd7d2f38a7eae016cc5749e48ac4e3d15c086d1d48df5b40ae33d4db3c608ab25a2dc81caaf27602728904945fb9e595d28370369a5e4d97bac

  • SSDEEP

    1536:QPpPWnPZz5ZEbHRVOF2fMg5bhQURqPlouaj7GDrDt5tVS+l:yp+nxz5SbHfO8EihdRqPFanYDtF9

Malware Config

Targets

    • Target

      belks.x86.elf

    • Size

      64KB

    • MD5

      a7e3298f28b271d5ee7eb6a6d271b4b3

    • SHA1

      a5b783060f6d03f4270806ff978301c092c7bc90

    • SHA256

      a550845280ea8fdc0880af246afe056162034152be4ec895594062ade43f7f7b

    • SHA512

      b1309f20fa88bfd7d2f38a7eae016cc5749e48ac4e3d15c086d1d48df5b40ae33d4db3c608ab25a2dc81caaf27602728904945fb9e595d28370369a5e4d97bac

    • SSDEEP

      1536:QPpPWnPZz5ZEbHRVOF2fMg5bhQURqPlouaj7GDrDt5tVS+l:yp+nxz5SbHfO8EihdRqPFanYDtF9

    • Contacts a large (227523) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks