General

  • Target

    ea3f273b3736eb935ca48da13e09e5df.bin

  • Size

    33KB

  • Sample

    230602-c7d1vahh9z

  • MD5

    6465c6ee46e5e74e10d0fa0b1841143e

  • SHA1

    29e8975f84a05f55d72b937dbf8145ef102ff50a

  • SHA256

    d7306569e7b818782cf64b5c81c4ee31061dead011cde2e786f01702e1d048ac

  • SHA512

    4ad191f60b5088734d2ccfa8ba2424b1d6b27e4f019b377292e90a1a856dd476c18e20caaa692a6343d635f187224d515819243cf53d46d75c328b3067e71837

  • SSDEEP

    768:dp61GkR+QlUBD5axbTX7dgP4mqa/kfCiikREueuS:uBOZABxgP4mZar+upS

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      0e2f70a9355e2c93f3eff4d203e0003092a305fb7e4a8591625b13ac85496151.elf

    • Size

      34KB

    • MD5

      ea3f273b3736eb935ca48da13e09e5df

    • SHA1

      bc74b46afd4159df6de086c53f36416463226d57

    • SHA256

      0e2f70a9355e2c93f3eff4d203e0003092a305fb7e4a8591625b13ac85496151

    • SHA512

      21daebbbd54e22d54fce13fccdd9512392d90d30b6ab7da38e62c9bd35d10668eb5a43fc6aac00d306efdc14cde5a450eb9cbb591fff9d67eebeee7377f6a8fc

    • SSDEEP

      768:1/YBLUqA9XH+hfs2ahhDCNKy5Saqn2TddbZwJgGlzDpUYsl:1/0ASfs2aeF5Sao2TTGVqYu

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (208799) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Scanning

2
T1046

Tasks