General

  • Target

    Yboats.x86.elf

  • Size

    42KB

  • Sample

    230514-npzqdaea9y

  • MD5

    0dd4eab267503551c205232b9ae6641d

  • SHA1

    b36dd30e0c301eef3fb08fd20392e1b1415d21e6

  • SHA256

    0412f9793ff956afe50fded530e604ee8109da34a41b291883a1232b9181e5a2

  • SHA512

    ae3eb76c7303291da64f7534539d7abfe2e4f1a7f2e8411dbbacefabebdfdc9e12985783766477192ba7d50ee60d6da8ae20657efe0931297c0c115c474bd3bc

  • SSDEEP

    768:OX37YdYw/bdTLH/WMYRKz0d5zTYFC8KRceYH/JIc+PdkrnbcuyD7UVyq+:O7YYadeGzq5TYFImrnouy8sq+

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      Yboats.x86.elf

    • Size

      42KB

    • MD5

      0dd4eab267503551c205232b9ae6641d

    • SHA1

      b36dd30e0c301eef3fb08fd20392e1b1415d21e6

    • SHA256

      0412f9793ff956afe50fded530e604ee8109da34a41b291883a1232b9181e5a2

    • SHA512

      ae3eb76c7303291da64f7534539d7abfe2e4f1a7f2e8411dbbacefabebdfdc9e12985783766477192ba7d50ee60d6da8ae20657efe0931297c0c115c474bd3bc

    • SSDEEP

      768:OX37YdYw/bdTLH/WMYRKz0d5zTYFC8KRceYH/JIc+PdkrnbcuyD7UVyq+:O7YYadeGzq5TYFImrnouy8sq+

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (1321811) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies the Watchdog daemon

      Malware like Mirai modify the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

    • Changes its process name

    • Deletes itself

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Reads system network configuration

      Uses contents of /proc filesystem to enumerate network settings.

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks