General

  • Target

    bef5663c3dcfbc3e1866bcf74f3f7516.elf

  • Size

    70KB

  • Sample

    240331-hj77nsga95

  • MD5

    bef5663c3dcfbc3e1866bcf74f3f7516

  • SHA1

    0edfb6350c07e8f5b5f5984785b9e13dc644b3a5

  • SHA256

    c78ccfaed2521b5bd28ab2734dca7b5aae28cd2657f945b2ad1997c500d2d849

  • SHA512

    da11e67633e6512d11611ebb6ee4f3ef7a4cec7e9329f1f3072256e194a11f88acbadb256855e937097a21568b6eae1b9f5c45a8fb131cb05072b6afb14c7619

  • SSDEEP

    1536:/NgPoiiWrhOlSuqLb4+3BpHISQaCOqCQIxXrFvM:/NgPsZxq/42pHIB/ABM

Score
10/10

Malware Config

Extracted

Family

mirai

C2

giga.giganoob.xyz

Targets

    • Target

      bef5663c3dcfbc3e1866bcf74f3f7516.elf

    • Size

      70KB

    • MD5

      bef5663c3dcfbc3e1866bcf74f3f7516

    • SHA1

      0edfb6350c07e8f5b5f5984785b9e13dc644b3a5

    • SHA256

      c78ccfaed2521b5bd28ab2734dca7b5aae28cd2657f945b2ad1997c500d2d849

    • SHA512

      da11e67633e6512d11611ebb6ee4f3ef7a4cec7e9329f1f3072256e194a11f88acbadb256855e937097a21568b6eae1b9f5c45a8fb131cb05072b6afb14c7619

    • SSDEEP

      1536:/NgPoiiWrhOlSuqLb4+3BpHISQaCOqCQIxXrFvM:/NgPsZxq/42pHIB/ABM

    Score
    7/10
    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

1
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

Tasks