General

  • Target

    7a7c85e4f7e738a3ff61e1baf5209daa

  • Size

    106KB

  • Sample

    231220-b5h2cafafl

  • MD5

    7a7c85e4f7e738a3ff61e1baf5209daa

  • SHA1

    d10d61cef3e9d63f8cb667a8c3bf39fe6f62e3b9

  • SHA256

    61ca0ae59e2ac0585594946a6d063a724721999d9c6f09914e96c7ae1daffe68

  • SHA512

    b82182253a3271645621df34aa51395aa5ebb0118ceb98611ca90517f8aa53c60784dc85d61dd4af2045f7da3ebdc0f935af45052f1afe83ef03411496017436

  • SSDEEP

    1536:22n25KJ810ErA0mU4juvrgAkoujRllmGiqWCCUI/v+z7gsZZzw/95/GzdbdVTSd:SKJi0en4jergAkiyWL5n+3gsXM/9NGzk

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ORPHIC

C2

cnc.botnetrep.xyz

Targets

    • Target

      7a7c85e4f7e738a3ff61e1baf5209daa

    • Size

      106KB

    • MD5

      7a7c85e4f7e738a3ff61e1baf5209daa

    • SHA1

      d10d61cef3e9d63f8cb667a8c3bf39fe6f62e3b9

    • SHA256

      61ca0ae59e2ac0585594946a6d063a724721999d9c6f09914e96c7ae1daffe68

    • SHA512

      b82182253a3271645621df34aa51395aa5ebb0118ceb98611ca90517f8aa53c60784dc85d61dd4af2045f7da3ebdc0f935af45052f1afe83ef03411496017436

    • SSDEEP

      1536:22n25KJ810ErA0mU4juvrgAkoujRllmGiqWCCUI/v+z7gsZZzw/95/GzdbdVTSd:SKJi0en4jergAkiyWL5n+3gsXM/9NGzk

    Score
    7/10
    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks