General
-
Target
193.143.1.32-arm-2025-02-01T100148.elf
-
Size
54KB
-
Sample
250201-nnvd9sskhj
-
MD5
faf2ffb607572a7e70e164eea0938f39
-
SHA1
026d002580a244a4504055ba1e06bdb3297efed1
-
SHA256
84ca99bb1f95fe4f5852da9fdd22886ded819bf9200124dca5bcf81d1cbce409
-
SHA512
18b36e29a18340508de7bb5765fe3d3c64d61cb40afbaf266cd273db9deb8d9d910850aa2af40c6fa4d3fa528d9e4b36ae835f96c78aea3bdfeb7105a82161d9
-
SSDEEP
1536:yLA5Hwb/QJVIOzndsya5FEt5YBgbWVBQ:yLA5HwWzdbagb+4WV+
Behavioral task
behavioral1
Sample
193.143.1.32-arm-2025-02-01T100148.elf
Resource
debian9-armhf-20240729-en
Malware Config
Targets
-
-
Target
193.143.1.32-arm-2025-02-01T100148.elf
-
Size
54KB
-
MD5
faf2ffb607572a7e70e164eea0938f39
-
SHA1
026d002580a244a4504055ba1e06bdb3297efed1
-
SHA256
84ca99bb1f95fe4f5852da9fdd22886ded819bf9200124dca5bcf81d1cbce409
-
SHA512
18b36e29a18340508de7bb5765fe3d3c64d61cb40afbaf266cd273db9deb8d9d910850aa2af40c6fa4d3fa528d9e4b36ae835f96c78aea3bdfeb7105a82161d9
-
SSDEEP
1536:yLA5Hwb/QJVIOzndsya5FEt5YBgbWVBQ:yLA5HwWzdbagb+4WV+
Score9/10-
Contacts a large (109442) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-