General

  • Target

    bot.x86.elf

  • Size

    64KB

  • Sample

    241215-w6jz9atrgn

  • MD5

    970ddbd3460fefdd5c379ac8b7848ddd

  • SHA1

    7747541579d59a4aa495a37d7850f75099af6b32

  • SHA256

    29f417f4deed43fed11a11e2f2cbf577bef30e836a4b0df7ac882b8871f56705

  • SHA512

    8ed7b5070ef8778ff567994d04539e2a5de785baf6e1ee5d17928d7f8c2038ef9be76cbfc40bd3914f414e01e994b9bc691ecc1c73fb10c46b6571d6b1d1e56f

  • SSDEEP

    1536:mX23TSwlS4keBfrtOVqlQzYnnmKBPKUz+eTWoTnt05HFEiQd:1jSwY4keBfrtOCQsnnF1JTNh05l3Q

Malware Config

Targets

    • Target

      bot.x86.elf

    • Size

      64KB

    • MD5

      970ddbd3460fefdd5c379ac8b7848ddd

    • SHA1

      7747541579d59a4aa495a37d7850f75099af6b32

    • SHA256

      29f417f4deed43fed11a11e2f2cbf577bef30e836a4b0df7ac882b8871f56705

    • SHA512

      8ed7b5070ef8778ff567994d04539e2a5de785baf6e1ee5d17928d7f8c2038ef9be76cbfc40bd3914f414e01e994b9bc691ecc1c73fb10c46b6571d6b1d1e56f

    • SSDEEP

      1536:mX23TSwlS4keBfrtOVqlQzYnnmKBPKUz+eTWoTnt05HFEiQd:1jSwY4keBfrtOCQsnnF1JTNh05l3Q

    • Contacts a large (240883) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks