General

  • Target

    KKveTTgaAAsecNNaaaa.x86.elf

  • Size

    69KB

  • Sample

    230426-ktaehagc43

  • MD5

    6479707c655bc8b3b9f5f6d6a97b05b9

  • SHA1

    d0f9d48862cb968aef1df80dd248a47f284313c5

  • SHA256

    3afc2a937ec64ebb6c8071d5d153b0a2910b67863ddd4c52cac1deee825004d1

  • SHA512

    711c59b05f894be3b45be7892f082270fb7535063289ccb7a3af057bae2ce54d7930d7ee6feb352b51d0b313a036a0302784e3e0f79aebd841de7f57c50d6e02

  • SSDEEP

    1536:ipoQGrdbVdc0vGG1ZyBU9UzZc+kukB0tHsG8g2CGmclg:tPbV5vGG6u9nBfBCMGfaC

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

C2

bot.kgfislove.cf

Targets

    • Target

      KKveTTgaAAsecNNaaaa.x86.elf

    • Size

      69KB

    • MD5

      6479707c655bc8b3b9f5f6d6a97b05b9

    • SHA1

      d0f9d48862cb968aef1df80dd248a47f284313c5

    • SHA256

      3afc2a937ec64ebb6c8071d5d153b0a2910b67863ddd4c52cac1deee825004d1

    • SHA512

      711c59b05f894be3b45be7892f082270fb7535063289ccb7a3af057bae2ce54d7930d7ee6feb352b51d0b313a036a0302784e3e0f79aebd841de7f57c50d6e02

    • SSDEEP

      1536:ipoQGrdbVdc0vGG1ZyBU9UzZc+kukB0tHsG8g2CGmclg:tPbV5vGG6u9nBfBCMGfaC

    Score
    9/10
    • Contacts a large (73674) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Changes its process name

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Enterprise v6

Tasks