General

  • Target

    vcimanagement.x86.elf

  • Size

    119KB

  • Sample

    241230-ld7kqsxkas

  • MD5

    df7bfd2e904ab2a3c3d306fe17c76d45

  • SHA1

    dc086476bec32913944c133d6539f2a79a537dd0

  • SHA256

    44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369

  • SHA512

    803fae83fcebdf98c3ba3b2bfbb344d793436fac94a75059b89772bde46d9e596d8ab565655d25b5081b046d9a6b2c05ad595f5d80ca2400eb2ee1eec390d9ac

  • SSDEEP

    3072:NGwFZYkgRucQX9LOVPxIgFWs+kM3TH9kboyuxaIaDcokxgNoDk8GNV:NvwYOnbG3aUgDcokxgNoDk8GNV

Malware Config

Targets

    • Target

      vcimanagement.x86.elf

    • Size

      119KB

    • MD5

      df7bfd2e904ab2a3c3d306fe17c76d45

    • SHA1

      dc086476bec32913944c133d6539f2a79a537dd0

    • SHA256

      44c45d6b511582fa946786726aef772d7f0596116d836a7dfa1d98531c467369

    • SHA512

      803fae83fcebdf98c3ba3b2bfbb344d793436fac94a75059b89772bde46d9e596d8ab565655d25b5081b046d9a6b2c05ad595f5d80ca2400eb2ee1eec390d9ac

    • SSDEEP

      3072:NGwFZYkgRucQX9LOVPxIgFWs+kM3TH9kboyuxaIaDcokxgNoDk8GNV:NvwYOnbG3aUgDcokxgNoDk8GNV

    • Contacts a large (23835) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks