General

  • Target

    f327086f96e9eb70f9c33c0128c07b58.elf

  • Size

    147KB

  • Sample

    240331-hj7wxaga89

  • MD5

    f327086f96e9eb70f9c33c0128c07b58

  • SHA1

    0a97675045e9a7c68470249b1192ab20baa3107d

  • SHA256

    019594320a888c9ed59737c2466a943b8d15d9d7c0166e707f099d5cd1ac374e

  • SHA512

    414b34835233471f107a94da8bdce9981bbd5776acbbd4bb2eea737b2211824df6f6647b8cbf52ad3e3f1f1f45ee14f6b4a596fe5524f3f02fdf9c78d4f30114

  • SSDEEP

    3072:dQjvnjBCa/D8ZuccRnoWnb5ocYKKTQupM/9AeW:dQj/9Ca/D8ZuccRoW6TKKMcM/9tW

Score
10/10

Malware Config

Extracted

Family

mirai

C2

giga.giganoob.xyz

Targets

    • Target

      f327086f96e9eb70f9c33c0128c07b58.elf

    • Size

      147KB

    • MD5

      f327086f96e9eb70f9c33c0128c07b58

    • SHA1

      0a97675045e9a7c68470249b1192ab20baa3107d

    • SHA256

      019594320a888c9ed59737c2466a943b8d15d9d7c0166e707f099d5cd1ac374e

    • SHA512

      414b34835233471f107a94da8bdce9981bbd5776acbbd4bb2eea737b2211824df6f6647b8cbf52ad3e3f1f1f45ee14f6b4a596fe5524f3f02fdf9c78d4f30114

    • SSDEEP

      3072:dQjvnjBCa/D8ZuccRnoWnb5ocYKKTQupM/9AeW:dQj/9Ca/D8ZuccRoW6TKKMcM/9tW

    Score
    7/10
    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

1
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

Tasks