General

  • Target

    13772dfb492cf62530c90d20c6d0a226

  • Size

    48KB

  • Sample

    231219-2gvcksheep

  • MD5

    13772dfb492cf62530c90d20c6d0a226

  • SHA1

    1a59c0f2857f994113500d7a1be9505b0fb004a1

  • SHA256

    b499b9fab41ae3ad4e07aeb409d87469435f0d15993e8af4ac33b4c67da6ad04

  • SHA512

    a6ac0952401bd7b9cac9eb8b7a5f1cbcc8348423fcf33fbc510fb48f8a6f62dfff70fdb864d9952cfc0e1965c64659e385fab8c8e8d87e7aeb2e362a10e5a836

  • SSDEEP

    768:7YeFRRiyMTlm5mbCreWUjCGf6aXY0rmp/YrkPl0cP4iEN8mHjUoSEg6Q8I1Ui:7YA5+CrRU2q5Xp4aQENzIoSEjQ8I1Ui

Malware Config

Extracted

Family

mirai

Botnet

APEP

Targets

    • Target

      13772dfb492cf62530c90d20c6d0a226

    • Size

      48KB

    • MD5

      13772dfb492cf62530c90d20c6d0a226

    • SHA1

      1a59c0f2857f994113500d7a1be9505b0fb004a1

    • SHA256

      b499b9fab41ae3ad4e07aeb409d87469435f0d15993e8af4ac33b4c67da6ad04

    • SHA512

      a6ac0952401bd7b9cac9eb8b7a5f1cbcc8348423fcf33fbc510fb48f8a6f62dfff70fdb864d9952cfc0e1965c64659e385fab8c8e8d87e7aeb2e362a10e5a836

    • SSDEEP

      768:7YeFRRiyMTlm5mbCreWUjCGf6aXY0rmp/YrkPl0cP4iEN8mHjUoSEg6Q8I1Ui:7YA5+CrRU2q5Xp4aQENzIoSEjQ8I1Ui

    Score
    9/10
    • Contacts a large (202416) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks