General

  • Target

    22236418d66d092a868814a050662cb6.bin

  • Size

    40KB

  • Sample

    230203-j5gsaagd5y

  • MD5

    5761f6ada99f7618e114b0fd5da1afd9

  • SHA1

    ed26e11e40faaa4b94dc9ab246c404bc60fbe4c9

  • SHA256

    9cfcbd1dbd072cc821a370f649d46d86b371f767bf7a3ac152f00c0c597fc002

  • SHA512

    4864bb3f83e44007c04ed5f44c9b021966b70949d9554f9424533baa1ac3bb9acc161e94202d7009b090999aacf5693e1d9e53a1f07cef897c464ac63b8b4483

  • SSDEEP

    768:MvXXJphvzwVi20c8Ij2aS2z/35VeLXZGHUNpmmChNEieFWV8ViD7+4P/pq7r1Ifk:wX5nkVi3c1S2DJVeLSUAAVoi45Kqk

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      ebab385a00e909ff7748edeecf15ffceba7748e9b0f9850142fe7ef8d5ed5ffe.elf

    • Size

      95KB

    • MD5

      22236418d66d092a868814a050662cb6

    • SHA1

      0bf047cdeb6ce406a32e0c305a2b9089c9e369c3

    • SHA256

      ebab385a00e909ff7748edeecf15ffceba7748e9b0f9850142fe7ef8d5ed5ffe

    • SHA512

      4b96f8ec59c601c8f880968beeabf4c617235518f6ad8a1091e22beb6494cc03bf81730f9bce6d7bda7ceb0ef963a3b9f4ec923711f07a1be4e55e5588255a0e

    • SSDEEP

      1536:+DdgrUgifAhAWUq1gt4h/m4iXGmLl5yDiywPveFpZNzJ:sgr7iIhymO4ajIiywPEDzJ

    Score
    9/10
    • Contacts a large (290975) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks