General

  • Target

    linux_arm6.elf

  • Size

    2.0MB

  • Sample

    250420-pvpyssyns2

  • MD5

    32a62effec59f84ec2c77fed3e1a7e10

  • SHA1

    ec11f032aa69e12668ed506066dec4b152f62fa0

  • SHA256

    eb4747754eddec0f52439175148a95860b7804c99d100260bff8444d37357282

  • SHA512

    419723104b956e7dc07d80c7da42611a5df3e55d8d841ffb7634d325516464f9d2774e4995cadc9aefbc6b118f57f596dd93ab8a239f97392380a64855361f2b

  • SSDEEP

    24576:WWk1VBrzE64PCK6uiK9Pzd5c8o916IqZa4F9yXcnIm6zVWZLVhS7uofvsQ4XyUta:xxdsU2T1

Malware Config

Extracted

Family

kaiji

C2

154.201.91.52:888

Targets

    • Target

      linux_arm6.elf

    • Size

      2.0MB

    • MD5

      32a62effec59f84ec2c77fed3e1a7e10

    • SHA1

      ec11f032aa69e12668ed506066dec4b152f62fa0

    • SHA256

      eb4747754eddec0f52439175148a95860b7804c99d100260bff8444d37357282

    • SHA512

      419723104b956e7dc07d80c7da42611a5df3e55d8d841ffb7634d325516464f9d2774e4995cadc9aefbc6b118f57f596dd93ab8a239f97392380a64855361f2b

    • SSDEEP

      24576:WWk1VBrzE64PCK6uiK9Pzd5c8o916IqZa4F9yXcnIm6zVWZLVhS7uofvsQ4XyUta:xxdsU2T1

    • Renames multiple (1004) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Creates/modifies environment variables

      Creating/modifying environment variables is a common persistence mechanism.

    • Disables SELinux

      Disables SELinux security module.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Write file to user bin folder

    • Modifies Bash startup script

MITRE ATT&CK Enterprise v16

Tasks