General

  • Target

    a8d7677ee8d0a71c52e521f8c82c3b19.bin

  • Size

    63KB

  • Sample

    230821-b6vfrsbh9t

  • MD5

    c65d320012b8a9c1cb551d1d70623da8

  • SHA1

    d9d62b9b8184727bde26de82c3df88880a5292a2

  • SHA256

    1b6a4cfdf690aa9177acf895874e2e70d0ce3550ae1c039d639984452a535513

  • SHA512

    f6d07fc93a99da1ffb700a67dc3e33f9c487ac919b3cfa3b73a5f5f2220c2ed33162db103523061067d8826f7649947566907e5808513644c0bbfbcb309a7623

  • SSDEEP

    1536:YbQRsGHYBmpcqXWKnqZn9qm0+djn/G1o7IRIm663jVeidI/f9V55km:YbQRHeqlqZ9X0+djkPImreiqn9b7

Score
10/10

Malware Config

Extracted

Family

mirai

C2

test.sharehy.com

Targets

    • Target

      83d2059a2c2aca3ead932f7dc3a500db615062f4ab92894b96bc496ed94b11f7.elf

    • Size

      140KB

    • MD5

      a8d7677ee8d0a71c52e521f8c82c3b19

    • SHA1

      7ddfdd6ebd319d579aa8be85e820e2d5e962671e

    • SHA256

      83d2059a2c2aca3ead932f7dc3a500db615062f4ab92894b96bc496ed94b11f7

    • SHA512

      12e97b656bdd856af28373535c7c5390c68a275051c9edff5fab68367ac68561ddd8128d1ccddf59b676929ae3be08e32e6c7cf6a4c023707cbcc27f0e812fe7

    • SSDEEP

      3072:Pib6EdR0WkESrJYqNo56juvMuK/U6YQXZaXWZ2M/9c/r:WnRpkESxhuvMuK//YcaX9M/9c/r

    Score
    9/10
    • Contacts a large (22877) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks