General

  • Target

    vcimanagement.armv4l.elf

  • Size

    135KB

  • Sample

    241230-mr8wdsvlaq

  • MD5

    3c6c60b6f04061407a67d4b3a7d48daf

  • SHA1

    720b890ede5f9a135ac48fa1416eccae5cfa02c8

  • SHA256

    efd2f23a5daa24d925987ae5645cac9963757bc0ccc1c383a9c652634e2aa559

  • SHA512

    008ee67ba176427788a42e5c1aee83923d37d6e2fdb3d2612287936e5c96221994875cac768891773948143a1a12ec616e069174df958c00947c9a683dd014cb

  • SSDEEP

    3072:rXdRZbLPWtIUio0QGRogfiVgDuj7+SmfIhi8hNg:JStIpaGRogf3Duj7+SmfIhi8hNg

Malware Config

Targets

    • Target

      vcimanagement.armv4l.elf

    • Size

      135KB

    • MD5

      3c6c60b6f04061407a67d4b3a7d48daf

    • SHA1

      720b890ede5f9a135ac48fa1416eccae5cfa02c8

    • SHA256

      efd2f23a5daa24d925987ae5645cac9963757bc0ccc1c383a9c652634e2aa559

    • SHA512

      008ee67ba176427788a42e5c1aee83923d37d6e2fdb3d2612287936e5c96221994875cac768891773948143a1a12ec616e069174df958c00947c9a683dd014cb

    • SSDEEP

      3072:rXdRZbLPWtIUio0QGRogfiVgDuj7+SmfIhi8hNg:JStIpaGRogf3Duj7+SmfIhi8hNg

    • Contacts a large (23355) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks