General

  • Target

    28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf

  • Size

    140KB

  • Sample

    250307-d2a8fatpv2

  • MD5

    e1d0b97db4f5c8387f6bd263e9eceedd

  • SHA1

    48b4781ae7fd5ed015ac4a30b78d7a5b96123994

  • SHA256

    28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870

  • SHA512

    f3bef76e3d4a7fc61746dbdd617a828e1398848728794c7ee5129332114d0a6bac8ffe05d17f09b793fd1e1bef1bfc42a695daae6699a6d20de5e306915a8958

  • SSDEEP

    3072:VYbSBlR85zjsTlYqNExIUXEOavkVQ/PcazWZSM/9vP/r:abuRuzjst7UXEOavoQMazZM/9vP/r

Malware Config

Targets

    • Target

      28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf

    • Size

      140KB

    • MD5

      e1d0b97db4f5c8387f6bd263e9eceedd

    • SHA1

      48b4781ae7fd5ed015ac4a30b78d7a5b96123994

    • SHA256

      28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870

    • SHA512

      f3bef76e3d4a7fc61746dbdd617a828e1398848728794c7ee5129332114d0a6bac8ffe05d17f09b793fd1e1bef1bfc42a695daae6699a6d20de5e306915a8958

    • SSDEEP

      3072:VYbSBlR85zjsTlYqNExIUXEOavkVQ/PcazWZSM/9vP/r:abuRuzjst7UXEOavoQMazZM/9vP/r

    • Contacts a large (23989) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks