Analysis

  • max time kernel
    154s
  • max time network
    157s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    19-12-2023 22:36

General

  • Target

    17a989238c3ebf411fdf8ed79c06f717

  • Size

    29KB

  • MD5

    17a989238c3ebf411fdf8ed79c06f717

  • SHA1

    0f8fe915bdddd1568b45a7df4c789109349458ef

  • SHA256

    7fe043bb4561ee0084990c771a09fe3bd730e58177341e5bc0221d58b4f72b69

  • SHA512

    fa23562093886bcd8831599c7554dac05809c3201713916cc446f10059ed93681e740d395cde3a373d7817c07c5d68796c3793e12028a4f03e956ae45487b698

  • SSDEEP

    384:MaUMzN8f05Rpjk5Yfo2xZUzKmQAHHOvgm0PtsgV9JV8Uaux7+fqSB+figWbETRIZ:V7N8fWlfowmQA3V9QFmSBtboMAQUeLJ

Malware Config

Extracted

Family

mirai

Botnet

UNST

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (20510) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Enumerates active TCP sockets 1 TTPs 1 IoCs

    Gets active TCP sockets from /proc virtual filesystem.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads system network configuration 1 TTPs 1 IoCs

    Uses contents of /proc filesystem to enumerate network settings.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/17a989238c3ebf411fdf8ed79c06f717
    /tmp/17a989238c3ebf411fdf8ed79c06f717
    1⤵
      PID:1542

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1542-1-0x0000000008048000-0x0000000008058e80-memory.dmp