General

  • Target

    x86.elf

  • Size

    140KB

  • Sample

    241204-xgcqbawjes

  • MD5

    940e95cef426d7a84b553331473fcf32

  • SHA1

    4bf7243b8d7d40b8a32817d76bfce8d827c6e32c

  • SHA256

    3a38b4de6a1f5d29b197a2ca23e87d97d912068fbfb2afeed30105f273f431a4

  • SHA512

    ad26694fd8685a26a2a8ff2f103d8f10e320818feb9e7aaed477e51e05d09e3917b1cb6eac6804cfaf903a59199d3806d858a61d279530cf18f66adb7def5ccb

  • SSDEEP

    3072:ezwFzskMXc8TfskyCBkIOVPem4MSRAW8+DA6Dcoixgr1TkM3Q:eGMXxJyCbOIdsEDcoixgr1TkM3Q

Malware Config

Targets

    • Target

      x86.elf

    • Size

      140KB

    • MD5

      940e95cef426d7a84b553331473fcf32

    • SHA1

      4bf7243b8d7d40b8a32817d76bfce8d827c6e32c

    • SHA256

      3a38b4de6a1f5d29b197a2ca23e87d97d912068fbfb2afeed30105f273f431a4

    • SHA512

      ad26694fd8685a26a2a8ff2f103d8f10e320818feb9e7aaed477e51e05d09e3917b1cb6eac6804cfaf903a59199d3806d858a61d279530cf18f66adb7def5ccb

    • SSDEEP

      3072:ezwFzskMXc8TfskyCBkIOVPem4MSRAW8+DA6Dcoixgr1TkM3Q:eGMXxJyCbOIdsEDcoixgr1TkM3Q

    • Contacts a large (71332) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks