General
-
Target
mipsel.nn.elf
-
Size
134KB
-
Sample
241120-dy66pszblb
-
MD5
2fcff406e1f57e00d98b987d23cd398f
-
SHA1
7675a391d83a38868d5f9194a9c7248291e1705a
-
SHA256
f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067
-
SHA512
6003c40f6af2626ab5fcf6fc381e4e27abb624111d8e297d24b2110d78134ade98cc702e0fe3c556b65900b9a03efbde16e53395280bdbf395b9d936c19227de
-
SSDEEP
1536:tLXuqtWr4N9zWJPEceN7U9empeIwOdzZXz8EmbycedlGcYx3dZ3aHXzy+LwCvnqX:puqtWr4DItmecedlotFU3vnqln
Static task
static1
Behavioral task
behavioral1
Sample
mipsel.nn.elf
Resource
debian12-mipsel-20240418-en
Malware Config
Targets
-
-
Target
mipsel.nn.elf
-
Size
134KB
-
MD5
2fcff406e1f57e00d98b987d23cd398f
-
SHA1
7675a391d83a38868d5f9194a9c7248291e1705a
-
SHA256
f34e59d9711b93c8c0192f717063b7db0d20cb342490a0c9fc9d9d63d245d067
-
SHA512
6003c40f6af2626ab5fcf6fc381e4e27abb624111d8e297d24b2110d78134ade98cc702e0fe3c556b65900b9a03efbde16e53395280bdbf395b9d936c19227de
-
SSDEEP
1536:tLXuqtWr4N9zWJPEceN7U9empeIwOdzZXz8EmbycedlGcYx3dZ3aHXzy+LwCvnqX:puqtWr4DItmecedlotFU3vnqln
-
Contacts a large (8910) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Creates/modifies environment variables
Creating/modifying environment variables is a common persistence mechanism.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
Modifies Bash startup script
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Privilege Escalation
Boot or Logon Autostart Execution
4XDG Autostart Entries
1Boot or Logon Initialization Scripts
2RC Scripts
2Create or Modify System Process
1Systemd Service
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1