General

  • Target

    SecuriteInfo.com.Trojan.Generic.33747869.27756.31810.elf

  • Size

    34KB

  • Sample

    230531-rt5c7sga2z

  • MD5

    ea3f273b3736eb935ca48da13e09e5df

  • SHA1

    bc74b46afd4159df6de086c53f36416463226d57

  • SHA256

    0e2f70a9355e2c93f3eff4d203e0003092a305fb7e4a8591625b13ac85496151

  • SHA512

    21daebbbd54e22d54fce13fccdd9512392d90d30b6ab7da38e62c9bd35d10668eb5a43fc6aac00d306efdc14cde5a450eb9cbb591fff9d67eebeee7377f6a8fc

  • SSDEEP

    768:1/YBLUqA9XH+hfs2ahhDCNKy5Saqn2TddbZwJgGlzDpUYsl:1/0ASfs2aeF5Sao2TTGVqYu

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      SecuriteInfo.com.Trojan.Generic.33747869.27756.31810.elf

    • Size

      34KB

    • MD5

      ea3f273b3736eb935ca48da13e09e5df

    • SHA1

      bc74b46afd4159df6de086c53f36416463226d57

    • SHA256

      0e2f70a9355e2c93f3eff4d203e0003092a305fb7e4a8591625b13ac85496151

    • SHA512

      21daebbbd54e22d54fce13fccdd9512392d90d30b6ab7da38e62c9bd35d10668eb5a43fc6aac00d306efdc14cde5a450eb9cbb591fff9d67eebeee7377f6a8fc

    • SSDEEP

      768:1/YBLUqA9XH+hfs2ahhDCNKy5Saqn2TddbZwJgGlzDpUYsl:1/0ASfs2aeF5Sao2TTGVqYu

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (166281) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Tasks