General

  • Target

    vcimanagement.mipsel.elf

  • Size

    161KB

  • Sample

    241230-myal6sxngt

  • MD5

    1b0406420db984c2cbb6ee3aad698637

  • SHA1

    a7ee0caf351694ddfbe3f7bc92210e4ee0b759df

  • SHA256

    d61b9d0ad1315a14e02a1f43215eea25d42f796a38c3b6b791a71a3333a247b7

  • SHA512

    538d60ab70f0308bedd3daf9b05353179ba9543ba58c8fd9eca26c3f6e3ad99784f87f55b5e7be9387e8af4153fe1ff4d6117a03ac7a48bec26aa31d39a9e431

  • SSDEEP

    1536:CQWeTCeoEVT/UCVlF3G9a2yydAZF7bZBFAKlP/Ua8xliPQsiDDTlm8WDEqO+rKNg:tedE2yqAzbrSl+iDDTljWDET+rKNg

Malware Config

Targets

    • Target

      vcimanagement.mipsel.elf

    • Size

      161KB

    • MD5

      1b0406420db984c2cbb6ee3aad698637

    • SHA1

      a7ee0caf351694ddfbe3f7bc92210e4ee0b759df

    • SHA256

      d61b9d0ad1315a14e02a1f43215eea25d42f796a38c3b6b791a71a3333a247b7

    • SHA512

      538d60ab70f0308bedd3daf9b05353179ba9543ba58c8fd9eca26c3f6e3ad99784f87f55b5e7be9387e8af4153fe1ff4d6117a03ac7a48bec26aa31d39a9e431

    • SSDEEP

      1536:CQWeTCeoEVT/UCVlF3G9a2yydAZF7bZBFAKlP/Ua8xliPQsiDDTlm8WDEqO+rKNg:tedE2yqAzbrSl+iDDTljWDET+rKNg

    • Contacts a large (23354) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks