General

  • Target

    arm7.elf

  • Size

    150KB

  • Sample

    250219-xhx3msylv7

  • MD5

    80269d55b2d3318b38c0005d1d5e7608

  • SHA1

    0dfed809728dde29468e5625b14d22e6fbabeba4

  • SHA256

    30d2470b70307604e441b00e03b86346161ce78d6749836cc8fd3283ae72b1c1

  • SHA512

    e63e9da3152e2d273ce23d93ae65776d9c209a47b9ca6724d62bfa6a97246f31d0f89bc25b9df2f39b2eb83d681503b5f797b7789720f4e83abaa445d0d9673b

  • SSDEEP

    3072:CQPd7ApUeTdwaeOiFgdtkLBGX/xN1AqXfMYM/9zzZWe:CQ17AKePttkLBGXpNRXfLM/9ZWe

Malware Config

Targets

    • Target

      arm7.elf

    • Size

      150KB

    • MD5

      80269d55b2d3318b38c0005d1d5e7608

    • SHA1

      0dfed809728dde29468e5625b14d22e6fbabeba4

    • SHA256

      30d2470b70307604e441b00e03b86346161ce78d6749836cc8fd3283ae72b1c1

    • SHA512

      e63e9da3152e2d273ce23d93ae65776d9c209a47b9ca6724d62bfa6a97246f31d0f89bc25b9df2f39b2eb83d681503b5f797b7789720f4e83abaa445d0d9673b

    • SSDEEP

      3072:CQPd7ApUeTdwaeOiFgdtkLBGX/xN1AqXfMYM/9zzZWe:CQ17AKePttkLBGXpNRXfLM/9ZWe

    • Contacts a large (488150) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks