General
-
Target
vcimanagement.x86.elf
-
Size
119KB
-
Sample
241230-ld7kqsxkas
-
MD5
df7bfd2e904ab2a3c3d306fe17c76d45
-
SHA1
dc086476bec32913944c133d6539f2a79a537dd0
-
SHA256
44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369
-
SHA512
803fae83fcebdf98c3ba3b2bfbb344d793436fac94a75059b89772bde46d9e596d8ab565655d25b5081b046d9a6b2c05ad595f5d80ca2400eb2ee1eec390d9ac
-
SSDEEP
3072:NGwFZYkgRucQX9LOVPxIgFWs+kM3TH9kboyuxaIaDcokxgNoDk8GNV:NvwYOnbG3aUgDcokxgNoDk8GNV
Behavioral task
behavioral1
Sample
vcimanagement.x86.elf
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Targets
-
-
Target
vcimanagement.x86.elf
-
Size
119KB
-
MD5
df7bfd2e904ab2a3c3d306fe17c76d45
-
SHA1
dc086476bec32913944c133d6539f2a79a537dd0
-
SHA256
44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369
-
SHA512
803fae83fcebdf98c3ba3b2bfbb344d793436fac94a75059b89772bde46d9e596d8ab565655d25b5081b046d9a6b2c05ad595f5d80ca2400eb2ee1eec390d9ac
-
SSDEEP
3072:NGwFZYkgRucQX9LOVPxIgFWs+kM3TH9kboyuxaIaDcokxgNoDk8GNV:NvwYOnbG3aUgDcokxgNoDk8GNV
Score9/10-
Contacts a large (23835) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-