General

  • Target

    959c319a9e229efab77eba8cd10fea63cbfbf6fde045785a6eeeb7a6007a4393.elf

  • Size

    128KB

  • Sample

    241231-c6yzmazndk

  • MD5

    f89c58a614a3bf3ec16f7016d09d6111

  • SHA1

    b481be23aaf7e2606c98d336d17dd803cf853f0a

  • SHA256

    959c319a9e229efab77eba8cd10fea63cbfbf6fde045785a6eeeb7a6007a4393

  • SHA512

    3bb4067351b366a8e746dc269612ed83ddf47d376df77f741d9c01996a3643e4589d705214165cb6efcfcb75ebe4dab855bf83f9f458e66df58607732b474d02

  • SSDEEP

    3072:BXv8ZkG9EqpIj6H6dXxf08hE+DOYS/SQvPyiiXNg:H5qpAwaXxfS+DOYS/SQvPyiiXNg

Malware Config

Targets

    • Target

      959c319a9e229efab77eba8cd10fea63cbfbf6fde045785a6eeeb7a6007a4393.elf

    • Size

      128KB

    • MD5

      f89c58a614a3bf3ec16f7016d09d6111

    • SHA1

      b481be23aaf7e2606c98d336d17dd803cf853f0a

    • SHA256

      959c319a9e229efab77eba8cd10fea63cbfbf6fde045785a6eeeb7a6007a4393

    • SHA512

      3bb4067351b366a8e746dc269612ed83ddf47d376df77f741d9c01996a3643e4589d705214165cb6efcfcb75ebe4dab855bf83f9f458e66df58607732b474d02

    • SSDEEP

      3072:BXv8ZkG9EqpIj6H6dXxf08hE+DOYS/SQvPyiiXNg:H5qpAwaXxfS+DOYS/SQvPyiiXNg

    • Contacts a large (23516) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks