General

  • Target

    baccfac095d7f93d6fb56f00e2542cf0bin.zip

  • Size

    66KB

  • Sample

    240106-lz3tnsebd6

  • MD5

    f0a4853ec5ef0f5d7bdc1a04de8ce0df

  • SHA1

    0f226bb03c8f372786e2260ae8ff0f6c9c287db6

  • SHA256

    2a3f7e660a50353ab8dfd941a4c07030cde2be3d7b31f3d4abbe1718b6483944

  • SHA512

    bcb1ad9733e6a422d6076bdf100b130f2c427fd5b0e6e1e33c5a9eb9322a480b46b4f13f6bbe4146897465be32ee3c0a227f684094ae35616611bb9fe6623010

  • SSDEEP

    1536:M9njgrqa4xCtrmeR/vjiVE/VM0/0lHCppqlIGWXNBJe:SjXbUk4jsE/VM0/OHuuNsNBw

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

cnc.catairlines.net

Targets

    • Target

      f7907fd93577b22ba3be2f994e445c5eb196ebc474aa99e61d30a4a4c07dca16.elf

    • Size

      152KB

    • MD5

      baccfac095d7f93d6fb56f00e2542cf0

    • SHA1

      375795450b95232a8fc8d318bac84cda24079624

    • SHA256

      f7907fd93577b22ba3be2f994e445c5eb196ebc474aa99e61d30a4a4c07dca16

    • SHA512

      0baf011f59e34511c36e587888d026d2088a19c432f327b7a2201a9ff5b7342d4e083c42cd17aaccad800c0a15180480cf18fe58be533d57d83499779af2cb5f

    • SSDEEP

      3072:87J9bRaoVf6aWaKzNRDIRQHr7jr/ytxzM/9w44pN:87JzNl6aWaKzNRcRy3/ytZM/9y7

    Score
    9/10
    • Contacts a large (7683) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks