General

  • Target

    arm7.elf

  • Size

    193KB

  • Sample

    231012-1w7e1see25

  • MD5

    bdc72c56f1569fb173908262c6d31861

  • SHA1

    979ec04befef45079c027419ea3e41422fd33520

  • SHA256

    190bf4e62e26ea5e20fc7d64890c388f221a1342ff374dc39b704af1b70b0772

  • SHA512

    68f5d467ac8e31d22810124d098d03a18ff16e8ae328c8b48aee53bed27a776b2a5c7ca98170020c8a231569641fdfd146b460b094805ac40b198c43af807013

  • SSDEEP

    6144:CUtcDtF0WQBB0abFymktTe77PCLyfJM/RfsmkjF:CUtcMBB0abFymktKPTfS/GR

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

mirai.diicot.net

yukiscan.zc.al

Targets

    • Target

      arm7.elf

    • Size

      193KB

    • MD5

      bdc72c56f1569fb173908262c6d31861

    • SHA1

      979ec04befef45079c027419ea3e41422fd33520

    • SHA256

      190bf4e62e26ea5e20fc7d64890c388f221a1342ff374dc39b704af1b70b0772

    • SHA512

      68f5d467ac8e31d22810124d098d03a18ff16e8ae328c8b48aee53bed27a776b2a5c7ca98170020c8a231569641fdfd146b460b094805ac40b198c43af807013

    • SSDEEP

      6144:CUtcDtF0WQBB0abFymktTe77PCLyfJM/RfsmkjF:CUtcMBB0abFymktKPTfS/GR

    Score
    9/10
    • Contacts a large (72816) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks