General

  • Target

    cb1fbbf8194bc1b67d1416f16801dd6c.elf

  • Size

    121KB

  • Sample

    221123-nswg5acf9z

  • MD5

    cb1fbbf8194bc1b67d1416f16801dd6c

  • SHA1

    c3c4a4aa6e2d6932a229b7ff65c353b91ff0827a

  • SHA256

    d377066d8a5e0177262032fb4a803547a819d196da9960a4f4972f35bfa5eeb2

  • SHA512

    24eaef9673a5c45af36e864c8b9d723d00754ada2da688b3500d4d01f74e28f259463a5668884cfa6663b41f83ab350a4f2dcd1ee8a59c70af0caf3f1d9f7206

  • SSDEEP

    3072:qEZhzRw+1o2Clr9EIepHPXB4iqfPjsM/9YM:lZhzp19Ur9EIepHvBkfPIM/9YM

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      cb1fbbf8194bc1b67d1416f16801dd6c.elf

    • Size

      121KB

    • MD5

      cb1fbbf8194bc1b67d1416f16801dd6c

    • SHA1

      c3c4a4aa6e2d6932a229b7ff65c353b91ff0827a

    • SHA256

      d377066d8a5e0177262032fb4a803547a819d196da9960a4f4972f35bfa5eeb2

    • SHA512

      24eaef9673a5c45af36e864c8b9d723d00754ada2da688b3500d4d01f74e28f259463a5668884cfa6663b41f83ab350a4f2dcd1ee8a59c70af0caf3f1d9f7206

    • SSDEEP

      3072:qEZhzRw+1o2Clr9EIepHPXB4iqfPjsM/9YM:lZhzp19Ur9EIepHvBkfPIM/9YM

    Score
    9/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Impair Defenses

1
T1562

Discovery

Network Service Scanning

1
T1046

Tasks