General
-
Target
Mozi.m.elf
-
Size
300KB
-
Sample
250120-k77bdsskb1
-
MD5
e730fdb7b4c3e5c8028025fc114d227f
-
SHA1
9211641cc499b5de2fc56c868e075d7b1b073715
-
SHA256
194020a156c76a28c802026c62891bc50e7d3a66d802b217edf9164d63cf597b
-
SHA512
5339282e3403643f660334eed6306231a27fb373c1db30e8bd8a55832d91732ca1bb241044f6c1e1063ca102769f6ba9c01251fadc023a1cd1387b5d953af8ba
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xiouwPa5POdOQ33Q:p3lOYoaja8xzx/0wsxzSiFfPqOJ
Behavioral task
behavioral1
Sample
Mozi.m.elf
Resource
debian9-mipsbe-20240418-en
Malware Config
Targets
-
-
Target
Mozi.m.elf
-
Size
300KB
-
MD5
e730fdb7b4c3e5c8028025fc114d227f
-
SHA1
9211641cc499b5de2fc56c868e075d7b1b073715
-
SHA256
194020a156c76a28c802026c62891bc50e7d3a66d802b217edf9164d63cf597b
-
SHA512
5339282e3403643f660334eed6306231a27fb373c1db30e8bd8a55832d91732ca1bb241044f6c1e1063ca102769f6ba9c01251fadc023a1cd1387b5d953af8ba
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xiouwPa5POdOQ33Q:p3lOYoaja8xzx/0wsxzSiFfPqOJ
Score9/10-
Contacts a large (11281) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Patched UPX-packed file
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1