General
-
Target
d811710149ca4be6c51ec05144d1d483e4a115223caba7d55d146193c1b3d312.elf
-
Size
50KB
-
Sample
250202-fpkx8axjaw
-
MD5
6ec5ae9244e138e2e3c619314f3daff7
-
SHA1
7b3f99c43ea2f2daa9b917a0af827d75570a66b7
-
SHA256
d811710149ca4be6c51ec05144d1d483e4a115223caba7d55d146193c1b3d312
-
SHA512
021c488ae19ac4f245c6f9a2ac8ac2e403f043c41b98431584d22890cc289e2513fc5d8e466ebd223f483c4dfd94af78fc95055ab102d5033f553a126915d407
-
SSDEEP
768:qaimRX3/EyYeGXIhz6WJs51E5hMeQEeE4eriu8RW5Xi+g4doIiI:qaimRXPEyyZxHE09Ep4iiu8EPTo
Behavioral task
behavioral1
Sample
d811710149ca4be6c51ec05144d1d483e4a115223caba7d55d146193c1b3d312.elf
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
d811710149ca4be6c51ec05144d1d483e4a115223caba7d55d146193c1b3d312.elf
-
Size
50KB
-
MD5
6ec5ae9244e138e2e3c619314f3daff7
-
SHA1
7b3f99c43ea2f2daa9b917a0af827d75570a66b7
-
SHA256
d811710149ca4be6c51ec05144d1d483e4a115223caba7d55d146193c1b3d312
-
SHA512
021c488ae19ac4f245c6f9a2ac8ac2e403f043c41b98431584d22890cc289e2513fc5d8e466ebd223f483c4dfd94af78fc95055ab102d5033f553a126915d407
-
SSDEEP
768:qaimRX3/EyYeGXIhz6WJs51E5hMeQEeE4eriu8RW5Xi+g4doIiI:qaimRXPEyyZxHE09Ep4iiu8EPTo
Score9/10-
Contacts a large (6705) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-