General

  • Target

    214ad3760ec3bd0855498d41f696f9a1

  • Size

    36KB

  • Sample

    220805-skk4msebh5

  • MD5

    214ad3760ec3bd0855498d41f696f9a1

  • SHA1

    e5b30c7099ca0f5a306a8d078f1b912427eceac5

  • SHA256

    2b1b92ad7eb5baefe743f592dfbba031b3b38cf712065d517257f0e669793ac9

  • SHA512

    514bc2fe9442b8e93dfdb466e2bb9a362d8efdac4acd1963e8cbc20f1afaa41448618aa333359deb5685fc206dd200d5b52cbdf649b2f4795cacccb466205118

Score
9/10

Malware Config

Targets

    • Target

      214ad3760ec3bd0855498d41f696f9a1

    • Size

      36KB

    • MD5

      214ad3760ec3bd0855498d41f696f9a1

    • SHA1

      e5b30c7099ca0f5a306a8d078f1b912427eceac5

    • SHA256

      2b1b92ad7eb5baefe743f592dfbba031b3b38cf712065d517257f0e669793ac9

    • SHA512

      514bc2fe9442b8e93dfdb466e2bb9a362d8efdac4acd1963e8cbc20f1afaa41448618aa333359deb5685fc206dd200d5b52cbdf649b2f4795cacccb466205118

    Score
    9/10
    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Tasks