General

  • Target

    f6992e9d2b62dd14a27078268f8f3182d10930b63eb6d3f8a704178c1fcc3ab0.elf

  • Size

    68KB

  • Sample

    241210-edpllaxqfq

  • MD5

    56e53d695c841e581df815c0725b8855

  • SHA1

    ec60dad1388ec1044b808a22791f794c1915f618

  • SHA256

    f6992e9d2b62dd14a27078268f8f3182d10930b63eb6d3f8a704178c1fcc3ab0

  • SHA512

    f7825a1c2e3dec98245b16002db1781a3205d1936553fa4c5dbb2b2622716941b757dfac135efc282f629d331b3cf91bcdc117f72ae33d97ce242b248d6514f6

  • SSDEEP

    1536:mOhjXtM7ayXRulHeEqPZTSBLDi8eKvJ3rw0hc1g4:mkXO7ayUJeEmZTSxD9eKvF8Qc1g

Malware Config

Targets

    • Target

      f6992e9d2b62dd14a27078268f8f3182d10930b63eb6d3f8a704178c1fcc3ab0.elf

    • Size

      68KB

    • MD5

      56e53d695c841e581df815c0725b8855

    • SHA1

      ec60dad1388ec1044b808a22791f794c1915f618

    • SHA256

      f6992e9d2b62dd14a27078268f8f3182d10930b63eb6d3f8a704178c1fcc3ab0

    • SHA512

      f7825a1c2e3dec98245b16002db1781a3205d1936553fa4c5dbb2b2622716941b757dfac135efc282f629d331b3cf91bcdc117f72ae33d97ce242b248d6514f6

    • SSDEEP

      1536:mOhjXtM7ayXRulHeEqPZTSBLDi8eKvJ3rw0hc1g4:mkXO7ayUJeEmZTSxD9eKvF8Qc1g

    • Contacts a large (23832) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks