General

  • Target

    bdc77afda6b9fc1d82ca1a0750b3e1dc.elf

  • Size

    133KB

  • Sample

    230606-2bxwhsfh88

  • MD5

    bdc77afda6b9fc1d82ca1a0750b3e1dc

  • SHA1

    9859792e4f0ef2d18f4977ca8b690f46ff08e8f1

  • SHA256

    432e01a3d3a989e847fa25458ed4aecb610f1983f868474b8d2816f7a08f5c5c

  • SHA512

    d08007faa522f6f75bd105bad9cf498aab792aaad928cdc0e6bfc735bf7369b67649240a2163ec8ac19e693a6247d0c55462000bea97debc3f4eafa1150823b2

  • SSDEEP

    3072:IIrDhJl8rkne9XVbe5YjsZgK/BPPY2pWZU97Yz1OoM/9BjUG6:ZrDhJl8rBS5MagK/BPwqWeuz1dM/9Bj+

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      bdc77afda6b9fc1d82ca1a0750b3e1dc.elf

    • Size

      133KB

    • MD5

      bdc77afda6b9fc1d82ca1a0750b3e1dc

    • SHA1

      9859792e4f0ef2d18f4977ca8b690f46ff08e8f1

    • SHA256

      432e01a3d3a989e847fa25458ed4aecb610f1983f868474b8d2816f7a08f5c5c

    • SHA512

      d08007faa522f6f75bd105bad9cf498aab792aaad928cdc0e6bfc735bf7369b67649240a2163ec8ac19e693a6247d0c55462000bea97debc3f4eafa1150823b2

    • SSDEEP

      3072:IIrDhJl8rkne9XVbe5YjsZgK/BPPY2pWZU97Yz1OoM/9BjUG6:ZrDhJl8rBS5MagK/BPwqWeuz1dM/9Bj+

    Score
    9/10
    • Contacts a large (94423) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v6

Tasks