General
-
Target
vcimanagement.i586.elf
-
Size
103KB
-
Sample
241230-mz476sxnhv
-
MD5
a3ff568c85a9828ab5a551178974baca
-
SHA1
c7a1d2747b42863e37f7d345244e28944d2e1373
-
SHA256
b66cb602de230f940ec42ae228e3c8a6729223352c477f8d57b2c2a3ef865b7f
-
SHA512
bd96b44b1e518ffacd46212482af87aa8bfa8d2205b341fefb37f53f6731a9a1e4238313465a6f281042b3c528bca110507e87ec7f021002bc80d14cb8b9824b
-
SSDEEP
3072:jvpdjSam6pRTU7F5b6o4eA+BR8QhDCOiMRIDLoE4gqXaah84:jvpcam6pdgnb6oTAeb8OiwIDLoE4gqXn
Behavioral task
behavioral1
Sample
vcimanagement.i586.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Targets
-
-
Target
vcimanagement.i586.elf
-
Size
103KB
-
MD5
a3ff568c85a9828ab5a551178974baca
-
SHA1
c7a1d2747b42863e37f7d345244e28944d2e1373
-
SHA256
b66cb602de230f940ec42ae228e3c8a6729223352c477f8d57b2c2a3ef865b7f
-
SHA512
bd96b44b1e518ffacd46212482af87aa8bfa8d2205b341fefb37f53f6731a9a1e4238313465a6f281042b3c528bca110507e87ec7f021002bc80d14cb8b9824b
-
SSDEEP
3072:jvpdjSam6pRTU7F5b6o4eA+BR8QhDCOiMRIDLoE4gqXaah84:jvpcam6pdgnb6oTAeb8OiwIDLoE4gqXn
Score9/10-
Contacts a large (23997) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-