General
-
Target
54ab484a8249dcc8c36cd28c22546b518836e12d7bae3fbed3b3642453f73d5f.elf
-
Size
72KB
-
Sample
250202-ext1esvngt
-
MD5
9a0249531baca3cf92ebe1fa27522d92
-
SHA1
89eba585573b74ee422bece2ae70fc540345cad7
-
SHA256
54ab484a8249dcc8c36cd28c22546b518836e12d7bae3fbed3b3642453f73d5f
-
SHA512
4df28512f00112adfa9ae1839cb9977f8e315022c08378c0d0a091c78a7f2f29911e669558ef3637ceaaed74c7ebb9bf3c9a454a2805a3b0899a22b9cf5d3cef
-
SSDEEP
1536:cBuGUrgqzxzeRuTFtrPNJczvMSpuxf2UOKvMzg6wnAVJwA:aujzFouTDrNJczSFdOKEzggVJwA
Behavioral task
behavioral1
Sample
54ab484a8249dcc8c36cd28c22546b518836e12d7bae3fbed3b3642453f73d5f.elf
Resource
ubuntu2004-amd64-20241127-en
Malware Config
Targets
-
-
Target
54ab484a8249dcc8c36cd28c22546b518836e12d7bae3fbed3b3642453f73d5f.elf
-
Size
72KB
-
MD5
9a0249531baca3cf92ebe1fa27522d92
-
SHA1
89eba585573b74ee422bece2ae70fc540345cad7
-
SHA256
54ab484a8249dcc8c36cd28c22546b518836e12d7bae3fbed3b3642453f73d5f
-
SHA512
4df28512f00112adfa9ae1839cb9977f8e315022c08378c0d0a091c78a7f2f29911e669558ef3637ceaaed74c7ebb9bf3c9a454a2805a3b0899a22b9cf5d3cef
-
SSDEEP
1536:cBuGUrgqzxzeRuTFtrPNJczvMSpuxf2UOKvMzg6wnAVJwA:aujzFouTDrNJczSFdOKEzggVJwA
Score9/10-
Contacts a large (23832) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-