General

  • Target

    arm7.elf

  • Size

    134KB

  • Sample

    231103-ebmdfsbf5s

  • MD5

    f5727685f7d0a4728f94b8f47d11a90a

  • SHA1

    b648cdaa4d91b4a9db83f697a613086eaac8e4f6

  • SHA256

    8fc5cfebdb403ad78b79b0e0805f3ca36394ea8bc23190722b4382f713f4c819

  • SHA512

    b92dbee9540ee0d894d83fa0b2acebb6fdab0d93037a1ab09a9cee0e52d3f7db45ebb84707b692d1f99db9b01e7fb3f31177716325c52187394d263e1759f50b

  • SSDEEP

    3072:eF6lvxDDVOyTrrOiC/qlQBcq3DZYcyWEwUnB7TxM/92:tlvxvVOyXrGilQBcq3DScinBRM/92

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      arm7.elf

    • Size

      134KB

    • MD5

      f5727685f7d0a4728f94b8f47d11a90a

    • SHA1

      b648cdaa4d91b4a9db83f697a613086eaac8e4f6

    • SHA256

      8fc5cfebdb403ad78b79b0e0805f3ca36394ea8bc23190722b4382f713f4c819

    • SHA512

      b92dbee9540ee0d894d83fa0b2acebb6fdab0d93037a1ab09a9cee0e52d3f7db45ebb84707b692d1f99db9b01e7fb3f31177716325c52187394d263e1759f50b

    • SSDEEP

      3072:eF6lvxDDVOyTrrOiC/qlQBcq3DZYcyWEwUnB7TxM/92:tlvxvVOyXrGilQBcq3DScinBRM/92

    Score
    9/10
    • Contacts a large (58179) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks