General

  • Target

    mips.elf

  • Size

    199KB

  • Sample

    241204-xgdbva1nan

  • MD5

    38fe13608abecb79cf88377bccaa1c70

  • SHA1

    9b3513259f88b0857220dc7537044839af03baca

  • SHA256

    b7613c7878637880cfb9ea0afc2f76852f1d643d72f23bf293f5857f8d698e2e

  • SHA512

    c805c547bff2d516b0ffeece9389c8ed11e13aac9cc3a7f36b982d0e2adc3b19ea73e770db6eb13aad594d46d788d13d83bbbfce51cff33a5a6a7ca5ad9d68a4

  • SSDEEP

    3072:YhwZRg8tuqYWwXxy9rb+33tFetC+4/ROw1JNV8UM6lhcHQGKvqco1yF79RFprT3Y:/YphogFDf+CNSnDDTlPWDyaejZh

Malware Config

Targets

    • Target

      mips.elf

    • Size

      199KB

    • MD5

      38fe13608abecb79cf88377bccaa1c70

    • SHA1

      9b3513259f88b0857220dc7537044839af03baca

    • SHA256

      b7613c7878637880cfb9ea0afc2f76852f1d643d72f23bf293f5857f8d698e2e

    • SHA512

      c805c547bff2d516b0ffeece9389c8ed11e13aac9cc3a7f36b982d0e2adc3b19ea73e770db6eb13aad594d46d788d13d83bbbfce51cff33a5a6a7ca5ad9d68a4

    • SSDEEP

      3072:YhwZRg8tuqYWwXxy9rb+33tFetC+4/ROw1JNV8UM6lhcHQGKvqco1yF79RFprT3Y:/YphogFDf+CNSnDDTlPWDyaejZh

    • Contacts a large (71342) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks