General

  • Target

    322dfbc72dc86b65bafaa13332f0e31b

  • Size

    31KB

  • Sample

    231219-2vjs1aeffn

  • MD5

    322dfbc72dc86b65bafaa13332f0e31b

  • SHA1

    54289add422400d9c4bda1f30cff819f4c4ce023

  • SHA256

    fb505fd6a43d3bf3034a30226c4f3744eacc3de0fb12dfd501addf2e20d9b11b

  • SHA512

    bed1a5beb0e1ac5b066110d42106377096d74a8bf6b6225d010cfac7c274341cc34facc3e0d420b7a945dfab5ae4d76274e9be085c89f37b041f871adb307a8e

  • SSDEEP

    384:h3fpCLrsjHIX69URc+hmnulY1qHprFKt6zW8zZMpSPyE/oBGuDa37RWGVCzhMhHO:lfpWcehzJFYKWYGWhiDa3lWMu

Malware Config

Extracted

Family

mirai

Botnet

UNST

Targets

    • Target

      322dfbc72dc86b65bafaa13332f0e31b

    • Size

      31KB

    • MD5

      322dfbc72dc86b65bafaa13332f0e31b

    • SHA1

      54289add422400d9c4bda1f30cff819f4c4ce023

    • SHA256

      fb505fd6a43d3bf3034a30226c4f3744eacc3de0fb12dfd501addf2e20d9b11b

    • SHA512

      bed1a5beb0e1ac5b066110d42106377096d74a8bf6b6225d010cfac7c274341cc34facc3e0d420b7a945dfab5ae4d76274e9be085c89f37b041f871adb307a8e

    • SSDEEP

      384:h3fpCLrsjHIX69URc+hmnulY1qHprFKt6zW8zZMpSPyE/oBGuDa37RWGVCzhMhHO:lfpWcehzJFYKWYGWhiDa3lWMu

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (20369) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks