General

  • Target

    vcimanagement.armv7l.elf

  • Size

    185KB

  • Sample

    241230-mr8wdsvlap

  • MD5

    1e69e0298d555e40144de7e2c620a70f

  • SHA1

    ce97619614500791f6f25e1a35660860fb6a810c

  • SHA256

    62520cfd3234028d0b5d824b73c9db271843424e4cfa78e9931f06fd290f747e

  • SHA512

    3d19690c6310f090ed36a86c9adf86e8e2e0552572ff075e3bf939007be23bd777e2d66bf60a266cd63ca4697156f64128807e9194856ff594a6d4c73dc11cf1

  • SSDEEP

    3072:OGep94UJx5CqNVDaTDLlpMtyhryb+RCYKTci228GM/9vIWmvtg4yFBZUyNL:ONvDaTDLlpMYhrRCYmci2OM/9gWmvtgt

Malware Config

Targets

    • Target

      vcimanagement.armv7l.elf

    • Size

      185KB

    • MD5

      1e69e0298d555e40144de7e2c620a70f

    • SHA1

      ce97619614500791f6f25e1a35660860fb6a810c

    • SHA256

      62520cfd3234028d0b5d824b73c9db271843424e4cfa78e9931f06fd290f747e

    • SHA512

      3d19690c6310f090ed36a86c9adf86e8e2e0552572ff075e3bf939007be23bd777e2d66bf60a266cd63ca4697156f64128807e9194856ff594a6d4c73dc11cf1

    • SSDEEP

      3072:OGep94UJx5CqNVDaTDLlpMtyhryb+RCYKTci228GM/9vIWmvtg4yFBZUyNL:ONvDaTDLlpMYhrRCYmci2OM/9gWmvtgt

    • Contacts a large (23102) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks