General

  • Target

    vcimanagement.mips.elf

  • Size

    161KB

  • Sample

    241230-lwmchsxlbs

  • MD5

    eeafaee0faf31dd636cb78f47913cd90

  • SHA1

    6b553ac236de37d192227ad1c88ec3e7744ea243

  • SHA256

    153f6c799071e51090c0bf34137a14fe9b1df5a6e0ffc7d3d1d9923ba303de3c

  • SHA512

    05ce26106dfd9f54c35ae1210e150a61e3c63c36aae74e178b32d86a7be1f5d64728de0a73ebada01af83264793eebb39445f4830ee26f11acded12e023a5fb7

  • SSDEEP

    3072:LMt8MRIGww/ndn0YC33zzujBj7YlFDDTljWDET+rKNg:ZMGLj4j7YlFDDTljWDET+rKNg

Malware Config

Targets

    • Target

      vcimanagement.mips.elf

    • Size

      161KB

    • MD5

      eeafaee0faf31dd636cb78f47913cd90

    • SHA1

      6b553ac236de37d192227ad1c88ec3e7744ea243

    • SHA256

      153f6c799071e51090c0bf34137a14fe9b1df5a6e0ffc7d3d1d9923ba303de3c

    • SHA512

      05ce26106dfd9f54c35ae1210e150a61e3c63c36aae74e178b32d86a7be1f5d64728de0a73ebada01af83264793eebb39445f4830ee26f11acded12e023a5fb7

    • SSDEEP

      3072:LMt8MRIGww/ndn0YC33zzujBj7YlFDDTljWDET+rKNg:ZMGLj4j7YlFDDTljWDET+rKNg

    • Contacts a large (23676) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks