General
-
Target
nabmips.elf
-
Size
50KB
-
Sample
250201-qzvwaawpgj
-
MD5
fcb6f0a26ef355ae9fddee67ff61e2ba
-
SHA1
b3ae8202807d815108f8d3f5b91da884407a9ead
-
SHA256
f4bce97c5172f7ac3a0f0fcd3d55027688e06b039fe1b3674b0c69f9b76d987b
-
SHA512
297309a620623a8ed94870b47315ad31d39b6dd83c55a0fd9eed06bae5c649eff2990af353338fa2819532081c997a4faf993ea3545a0bcf3e46689a3fb7443e
-
SSDEEP
1536:dMO1gEnsiOazyDuNHUPEqvmu4WtSVWlx9BASq1:d339O4Wv39SSq1
Behavioral task
behavioral1
Sample
nabmips.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Targets
-
-
Target
nabmips.elf
-
Size
50KB
-
MD5
fcb6f0a26ef355ae9fddee67ff61e2ba
-
SHA1
b3ae8202807d815108f8d3f5b91da884407a9ead
-
SHA256
f4bce97c5172f7ac3a0f0fcd3d55027688e06b039fe1b3674b0c69f9b76d987b
-
SHA512
297309a620623a8ed94870b47315ad31d39b6dd83c55a0fd9eed06bae5c649eff2990af353338fa2819532081c997a4faf993ea3545a0bcf3e46689a3fb7443e
-
SSDEEP
1536:dMO1gEnsiOazyDuNHUPEqvmu4WtSVWlx9BASq1:d339O4Wv39SSq1
Score9/10-
Contacts a large (5449) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-