General

  • Target

    5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf

  • Size

    66KB

  • Sample

    250202-ezbxmavpdx

  • MD5

    039223d2b7b6cccba603bb55ff1db3b9

  • SHA1

    cd1984a0e2539416f0ae5e774c1b3fb2ab6b9421

  • SHA256

    5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0

  • SHA512

    e0a7e833dcafa9adc72dc67e5951e87a6c953c5e32b9b0a118ce72338b5940d62ebcb166353300c9b2554b4584c1495419daba729f4f0e773be7648f13c3caaf

  • SSDEEP

    768:P79+h7Kfbq19azhX6NpQsq/bxy2MB5/Qn5V5eIXezbevQYGzgi9XXirqwJklqIO:P794Kzq19uhwik2yonl9XibOQYGZ8kB

Malware Config

Targets

    • Target

      5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf

    • Size

      66KB

    • MD5

      039223d2b7b6cccba603bb55ff1db3b9

    • SHA1

      cd1984a0e2539416f0ae5e774c1b3fb2ab6b9421

    • SHA256

      5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0

    • SHA512

      e0a7e833dcafa9adc72dc67e5951e87a6c953c5e32b9b0a118ce72338b5940d62ebcb166353300c9b2554b4584c1495419daba729f4f0e773be7648f13c3caaf

    • SSDEEP

      768:P79+h7Kfbq19azhX6NpQsq/bxy2MB5/Qn5V5eIXezbevQYGzgi9XXirqwJklqIO:P794Kzq19uhwik2yonl9XibOQYGZ8kB

    • Contacts a large (103450) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks