Analysis

  • max time kernel
    153s
  • max time network
    155s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231215-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231215-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    12/02/2024, 02:43

General

  • Target

    8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43.elf

  • Size

    36KB

  • MD5

    184047f63f7a90e80013490538c9416c

  • SHA1

    623474bf1cb4e40d6b4b18d8c1e9e4bc2014ffed

  • SHA256

    8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43

  • SHA512

    f522f9d9d455ffba51403d0bbe560a08af6f54afe7879fba58128d87712f9e2cab5aac55d3b646833ef3b1dc77bb788bfce9149e362bc70468f1afd22721f609

  • SSDEEP

    768:N2+9wmSvVydtj6sq+BY+uBEyiHBFiQCeN4I/DbjkBSYr/scRrQHc1Nfv9sPqa:N2ewmSvVGZBrBY+u/mLXlOIb3iSYbRAh

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

C2

194.169.175.3

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (76249) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Deletes itself 1 IoCs
  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43.elf
    /tmp/8f4123376f6e62c0fb0c2873c3b296938b4e4a9e71bf9ca79354a379c97c6f43.elf
    1⤵
    • Changes its process name
    • Deletes itself
    • Reads runtime system information
    PID:1523

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads