General

  • Target

    nabmips.elf

  • Size

    50KB

  • Sample

    250201-qzvwaawpgj

  • MD5

    fcb6f0a26ef355ae9fddee67ff61e2ba

  • SHA1

    b3ae8202807d815108f8d3f5b91da884407a9ead

  • SHA256

    f4bce97c5172f7ac3a0f0fcd3d55027688e06b039fe1b3674b0c69f9b76d987b

  • SHA512

    297309a620623a8ed94870b47315ad31d39b6dd83c55a0fd9eed06bae5c649eff2990af353338fa2819532081c997a4faf993ea3545a0bcf3e46689a3fb7443e

  • SSDEEP

    1536:dMO1gEnsiOazyDuNHUPEqvmu4WtSVWlx9BASq1:d339O4Wv39SSq1

Malware Config

Targets

    • Target

      nabmips.elf

    • Size

      50KB

    • MD5

      fcb6f0a26ef355ae9fddee67ff61e2ba

    • SHA1

      b3ae8202807d815108f8d3f5b91da884407a9ead

    • SHA256

      f4bce97c5172f7ac3a0f0fcd3d55027688e06b039fe1b3674b0c69f9b76d987b

    • SHA512

      297309a620623a8ed94870b47315ad31d39b6dd83c55a0fd9eed06bae5c649eff2990af353338fa2819532081c997a4faf993ea3545a0bcf3e46689a3fb7443e

    • SSDEEP

      1536:dMO1gEnsiOazyDuNHUPEqvmu4WtSVWlx9BASq1:d339O4Wv39SSq1

    • Contacts a large (5449) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks