General
-
Target
vcimanagement.mips.elf
-
Size
161KB
-
Sample
241230-lwmchsxlbs
-
MD5
eeafaee0faf31dd636cb78f47913cd90
-
SHA1
6b553ac236de37d192227ad1c88ec3e7744ea243
-
SHA256
153f6c799071e51090c0bf34137a14fe9b1df5a6e0ffc7d3d1d9923ba303de3c
-
SHA512
05ce26106dfd9f54c35ae1210e150a61e3c63c36aae74e178b32d86a7be1f5d64728de0a73ebada01af83264793eebb39445f4830ee26f11acded12e023a5fb7
-
SSDEEP
3072:LMt8MRIGww/ndn0YC33zzujBj7YlFDDTljWDET+rKNg:ZMGLj4j7YlFDDTljWDET+rKNg
Behavioral task
behavioral1
Sample
vcimanagement.mips.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Targets
-
-
Target
vcimanagement.mips.elf
-
Size
161KB
-
MD5
eeafaee0faf31dd636cb78f47913cd90
-
SHA1
6b553ac236de37d192227ad1c88ec3e7744ea243
-
SHA256
153f6c799071e51090c0bf34137a14fe9b1df5a6e0ffc7d3d1d9923ba303de3c
-
SHA512
05ce26106dfd9f54c35ae1210e150a61e3c63c36aae74e178b32d86a7be1f5d64728de0a73ebada01af83264793eebb39445f4830ee26f11acded12e023a5fb7
-
SSDEEP
3072:LMt8MRIGww/ndn0YC33zzujBj7YlFDDTljWDET+rKNg:ZMGLj4j7YlFDDTljWDET+rKNg
Score9/10-
Contacts a large (23676) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-