General

  • Target

    vcimanagement.i586.elf

  • Size

    103KB

  • Sample

    241230-mz476sxnhv

  • MD5

    a3ff568c85a9828ab5a551178974baca

  • SHA1

    c7a1d2747b42863e37f7d345244e28944d2e1373

  • SHA256

    b66cb602de230f940ec42ae228e3c8a6729223352c477f8d57b2c2a3ef865b7f

  • SHA512

    bd96b44b1e518ffacd46212482af87aa8bfa8d2205b341fefb37f53f6731a9a1e4238313465a6f281042b3c528bca110507e87ec7f021002bc80d14cb8b9824b

  • SSDEEP

    3072:jvpdjSam6pRTU7F5b6o4eA+BR8QhDCOiMRIDLoE4gqXaah84:jvpcam6pdgnb6oTAeb8OiwIDLoE4gqXn

Malware Config

Targets

    • Target

      vcimanagement.i586.elf

    • Size

      103KB

    • MD5

      a3ff568c85a9828ab5a551178974baca

    • SHA1

      c7a1d2747b42863e37f7d345244e28944d2e1373

    • SHA256

      b66cb602de230f940ec42ae228e3c8a6729223352c477f8d57b2c2a3ef865b7f

    • SHA512

      bd96b44b1e518ffacd46212482af87aa8bfa8d2205b341fefb37f53f6731a9a1e4238313465a6f281042b3c528bca110507e87ec7f021002bc80d14cb8b9824b

    • SSDEEP

      3072:jvpdjSam6pRTU7F5b6o4eA+BR8QhDCOiMRIDLoE4gqXaah84:jvpcam6pdgnb6oTAeb8OiwIDLoE4gqXn

    • Contacts a large (23997) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks