General

  • Target

    13e1a4d77e5fb05097f77734848bbdb4.bin

  • Size

    62KB

  • Sample

    241206-bdgzza1qcy

  • MD5

    1b4af3c567b669fe8bc9678a6a1a970b

  • SHA1

    bde6eb0559ca7465ce81ff2718f5e5a956e82867

  • SHA256

    fa8d09bd9da1fee26bec3b6f8012a05612c0224c3d4e9f28e816f7a77440d300

  • SHA512

    204c8c106ab8449680bf7627675797361fbe32742d6287ce3695b26d94b875c9aefeafced91cc501af3011aed7d6ad8af2cf17ed0a1633f9aaa73bae74fd0aad

  • SSDEEP

    1536:JeR6g2ix3DrD+tDP/iy6S1lLR5b8mFpKSJa3DtNHdlZZZWDj9MZvm1h6:8YgxzrD83F1lf8mFpY3DtNHdfWDj9svT

Malware Config

Targets

    • Target

      cb3d517ee9d8cf801e226da7f54fee49491e774fd8287d49e6a2def85d3a81e8.elf

    • Size

      199KB

    • MD5

      13e1a4d77e5fb05097f77734848bbdb4

    • SHA1

      2941650f51d3a5ffb0f2a6a651823e31c5a32f46

    • SHA256

      cb3d517ee9d8cf801e226da7f54fee49491e774fd8287d49e6a2def85d3a81e8

    • SHA512

      131b423be23a4ca3dfd5728cc644f892a2bef374fdc41e1e762f29aeb32bd00060537c35664a5fc39fbd39dd1e123628a4e36a504b69e5e7aeb97fa322b18ce8

    • SSDEEP

      3072:ooIR900aTESn9teFTmlaIW9OHDDTlPWDyaejZh:oowVSeFTm0wDDTlPWDyaejZh

    • Contacts a large (68888) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks