General

  • Target

    b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7.elf

  • Size

    90KB

  • Sample

    250307-g2mg9avybs

  • MD5

    98898ddd2ea26ec2d37f0a02c8315f4a

  • SHA1

    f491994473acb3c6c755be10fd7bc948c1b6e773

  • SHA256

    b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7

  • SHA512

    4bdfe4eda521a7bcf33668679a642b17351d63b2c1c47f9644be737ad3483a0a40e3cf7d061ab522b5ac7306180cd96381d27510046acaf0ede096e88395f7c6

  • SSDEEP

    1536:2hG+9sUX9ZBLftw+TKp6/qL+KyBJkMFlRgl+o5ZS4Hi:iG+9sUX9fftj+p6HC5

Malware Config

Targets

    • Target

      b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7.elf

    • Size

      90KB

    • MD5

      98898ddd2ea26ec2d37f0a02c8315f4a

    • SHA1

      f491994473acb3c6c755be10fd7bc948c1b6e773

    • SHA256

      b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7

    • SHA512

      4bdfe4eda521a7bcf33668679a642b17351d63b2c1c47f9644be737ad3483a0a40e3cf7d061ab522b5ac7306180cd96381d27510046acaf0ede096e88395f7c6

    • SSDEEP

      1536:2hG+9sUX9ZBLftw+TKp6/qL+KyBJkMFlRgl+o5ZS4Hi:iG+9sUX9fftj+p6HC5

    • Contacts a large (23833) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks