General

  • Target

    ee6b5d1158f014164fcf8ef8129d815e.elf

  • Size

    70KB

  • Sample

    230330-rlpb1sda44

  • MD5

    ee6b5d1158f014164fcf8ef8129d815e

  • SHA1

    bd0de7554d10c36ae20f009461ec3e9f64c44d91

  • SHA256

    790faa4fca778e11839a75c76b0537b9124ba01397127bf8419319c16cc4312f

  • SHA512

    99edeb05dc2cf212d62bd703573d89487577e6095c67c881e83a1eb5d7cd876d7190142a90245fbb30370c7d71389e71074ad9382c265393300beea10fc519c4

  • SSDEEP

    1536:NsW3j2TlFXTc2qkUOsZnpGZv/6OC3GP6czZuwkkJSEjVt2N:t3jilFXf8GV/xJIrkc4VtM

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      ee6b5d1158f014164fcf8ef8129d815e.elf

    • Size

      70KB

    • MD5

      ee6b5d1158f014164fcf8ef8129d815e

    • SHA1

      bd0de7554d10c36ae20f009461ec3e9f64c44d91

    • SHA256

      790faa4fca778e11839a75c76b0537b9124ba01397127bf8419319c16cc4312f

    • SHA512

      99edeb05dc2cf212d62bd703573d89487577e6095c67c881e83a1eb5d7cd876d7190142a90245fbb30370c7d71389e71074ad9382c265393300beea10fc519c4

    • SSDEEP

      1536:NsW3j2TlFXTc2qkUOsZnpGZv/6OC3GP6czZuwkkJSEjVt2N:t3jilFXf8GV/xJIrkc4VtM

    Score
    9/10
    • Contacts a large (283886) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks