General

  • Target

    Rakitin.arm7.elf

  • Size

    68KB

  • Sample

    240104-lvg2eadbam

  • MD5

    ff41ffea03b41f42044a6e340578f3eb

  • SHA1

    ac97c2ae9e84ef4f4d2b993a64fe87be71c75213

  • SHA256

    0967b7aca84aa469261ab69595f81a601eede01b1c565fd58ce8fc2a18128449

  • SHA512

    925e4858cec003af6747904c7acdf62f6bceaedee87aa92fb975c41e294c5992ae2cdd60e10552d87b280da7dd69998c04127e31edc6eb0ada7d62afe9da8ac0

  • SSDEEP

    1536:xu9mgdWUiytxO1gYYpdFo0EXlxBL/ppl7L+a:E9mgdWUXtxOzYbFoPBL//l7qa

Malware Config

Extracted

Family

mirai

Botnet

RAKITIN

Targets

    • Target

      Rakitin.arm7.elf

    • Size

      68KB

    • MD5

      ff41ffea03b41f42044a6e340578f3eb

    • SHA1

      ac97c2ae9e84ef4f4d2b993a64fe87be71c75213

    • SHA256

      0967b7aca84aa469261ab69595f81a601eede01b1c565fd58ce8fc2a18128449

    • SHA512

      925e4858cec003af6747904c7acdf62f6bceaedee87aa92fb975c41e294c5992ae2cdd60e10552d87b280da7dd69998c04127e31edc6eb0ada7d62afe9da8ac0

    • SSDEEP

      1536:xu9mgdWUiytxO1gYYpdFo0EXlxBL/ppl7L+a:E9mgdWUXtxOzYbFoPBL//l7qa

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (63038) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks