General

  • Target

    file-arm.elf

  • Size

    175KB

  • Sample

    250102-rey8msvjhy

  • MD5

    390f1382237b5a01dd46bf1404c223e7

  • SHA1

    28976d0de5260fcdc620240bbad78424addd6232

  • SHA256

    03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d

  • SHA512

    ea2104284eb5efceade8400c2b57a34758f7507b0de4745cfab88d0f4f91222bf1f3ff9ba72912f48d53c22d87dca0600f54817de048ffe41bad8552e33bf339

  • SSDEEP

    3072:yOCadKI8clvfc0rXCMf4ZaxOQy+Ejhk/5UMllWWOcNuM/9ad4xofaZRK0mGHdNi6:/CadKI8c+bxZaxOQy+ehlMlYWOcAM/91

Malware Config

Targets

    • Target

      file-arm.elf

    • Size

      175KB

    • MD5

      390f1382237b5a01dd46bf1404c223e7

    • SHA1

      28976d0de5260fcdc620240bbad78424addd6232

    • SHA256

      03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d

    • SHA512

      ea2104284eb5efceade8400c2b57a34758f7507b0de4745cfab88d0f4f91222bf1f3ff9ba72912f48d53c22d87dca0600f54817de048ffe41bad8552e33bf339

    • SSDEEP

      3072:yOCadKI8clvfc0rXCMf4ZaxOQy+Ejhk/5UMllWWOcNuM/9ad4xofaZRK0mGHdNi6:/CadKI8c+bxZaxOQy+ehlMlYWOcAM/91

    • Contacts a large (374062) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks