General

  • Target

    z3hir.x86.elf

  • Size

    29KB

  • Sample

    230901-1qgbmsaa3z

  • MD5

    040ca4bffcffe7f53707e83f467786a9

  • SHA1

    df6cfa39336c5e5d6d9bea647be52e697a2bb53a

  • SHA256

    2243519315b67ece4532963a7a560392ae45fa69dc792dfa95b6770ee8db6758

  • SHA512

    6cac7041461e4407c26f8a3552dff6ded18517c2522deccc6c92bd4226a0a277c157666315549daf047031f44ba843d691dcd8ebe12381c9c8e9743f0ac39dad

  • SSDEEP

    768:WN8f6tfoQmQAXV7E1QDvjnVjA2mCT6oqq:2MJXFl7IQjGAn

Malware Config

Extracted

Family

mirai

Botnet

UNST

Targets

    • Target

      z3hir.x86.elf

    • Size

      29KB

    • MD5

      040ca4bffcffe7f53707e83f467786a9

    • SHA1

      df6cfa39336c5e5d6d9bea647be52e697a2bb53a

    • SHA256

      2243519315b67ece4532963a7a560392ae45fa69dc792dfa95b6770ee8db6758

    • SHA512

      6cac7041461e4407c26f8a3552dff6ded18517c2522deccc6c92bd4226a0a277c157666315549daf047031f44ba843d691dcd8ebe12381c9c8e9743f0ac39dad

    • SSDEEP

      768:WN8f6tfoQmQAXV7E1QDvjnVjA2mCT6oqq:2MJXFl7IQjGAn

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (20686) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks