General

  • Target

    a8d3af50def78d8173e8aecc1e96eea3.bin

  • Size

    89KB

  • Sample

    230607-c1sknahb31

  • MD5

    6b2bf66274f1cfbce3493850a35afda5

  • SHA1

    e8ec41b94d11f5b8b6b25f1e2f3fb7877227cc33

  • SHA256

    672e5151382326391dc17823fa960311d26d4fda693b6c3476f556948d53de59

  • SHA512

    1a2e1e764de33c90fe55d9dbf7348ba0cfda8edcce1d1335e79ee4159e10d616787e67dd42d7bc21eb8f7fcf4d7405d262f296be894e5cf6353054f6a7e8068e

  • SSDEEP

    1536:9QZEDlHQrZ98uyE3ZOG1R6tCXe20CkwC/gzy1thLByD7SbSvBoTAHupO9L:yWZwd98NE38jUXzkwC/gzODLBuSeaAu6

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      fa68279f6cf4262aa45321c9a4d882845318d67458761cf2439e1e3244b34184.elf

    • Size

      263KB

    • MD5

      a8d3af50def78d8173e8aecc1e96eea3

    • SHA1

      e7ee9eee70ae398eafc2f254b7bbfc7a1af81df7

    • SHA256

      fa68279f6cf4262aa45321c9a4d882845318d67458761cf2439e1e3244b34184

    • SHA512

      650b464193c8ee0791bfd7eb20a3f0491d3642a178fc1ebb7f6031cf60ad79c87838ee554cf784518921a18ee351986b33cb5d9e2e05fd6bfe4a0c5cb04dcc79

    • SSDEEP

      6144:pMtDF16WglC1RbRcZQaC9mrsplDKZUfQBKXAVantX+F8Jyvp1G6xxn4J+fBhrild:pMtDF16WgQUo9mrsplDKZ2QBKXAVantz

    Score
    9/10
    • Contacts a large (18953) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v6

Tasks