Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20230621-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20230621-enkernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    23/07/2023, 01:19

General

  • Target

    d1382ae79bfca963d493ada55cdc759a2c809d66020c55722b0016f6c6522874.elf

  • Size

    34KB

  • MD5

    3063db1d8b9970df0c740e8c7d5b9bfa

  • SHA1

    69fb67be086affc9cd4940db800bb58fc98df77a

  • SHA256

    d1382ae79bfca963d493ada55cdc759a2c809d66020c55722b0016f6c6522874

  • SHA512

    566c2fc1e9a59732c169d1750b74bcbd04af35a0bc906169f3a19f4ab7fc8348bdfce9749b974ef5480c8daefc017cd428b68ec8972eaeac9e4370cb3da6c6cd

  • SSDEEP

    768:2KDYrnxTs7hkm8/XWfFMHNDuCQ8eupoEIwURusnbcuyD7UfyqV:2DFi8vaFMHNysIwUNnouy8qqV

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

bp.skyman.cloud

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (180861) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs
  • Reads runtime system information 15 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d1382ae79bfca963d493ada55cdc759a2c809d66020c55722b0016f6c6522874.elf
    /tmp/d1382ae79bfca963d493ada55cdc759a2c809d66020c55722b0016f6c6522874.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    PID:599

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads