General

  • Target

    697-1-0x00400000-0x00454958-memory.dmp

  • Size

    81KB

  • Sample

    240416-r57ygaec6v

  • MD5

    83f7224bcc55744c47804e5ea715f824

  • SHA1

    c982957171abe141338332c03d6e1dec894e37cf

  • SHA256

    5ed717a3169880c8cebf49a929d832faa178aee8b2ee160ee35106b1ffd7a693

  • SHA512

    6e9dfeabed1f474c1ac3dc3b2192372a780bcf693c12ca9c9ff656692ae9f87ff81a0c8ef9e35eac9ab1c832355c27540ea0010ae066f0325e728ed4a5e14c84

  • SSDEEP

    1536:4FBqlRzSGV3l3ZZ+CtMQ67ebl0bfpySqHXGFG4sa/aq/G:oqvSGV39JeQ67eJiFG4sa/ayG

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      697-1-0x00400000-0x00454958-memory.dmp

    • Size

      81KB

    • MD5

      83f7224bcc55744c47804e5ea715f824

    • SHA1

      c982957171abe141338332c03d6e1dec894e37cf

    • SHA256

      5ed717a3169880c8cebf49a929d832faa178aee8b2ee160ee35106b1ffd7a693

    • SHA512

      6e9dfeabed1f474c1ac3dc3b2192372a780bcf693c12ca9c9ff656692ae9f87ff81a0c8ef9e35eac9ab1c832355c27540ea0010ae066f0325e728ed4a5e14c84

    • SSDEEP

      1536:4FBqlRzSGV3l3ZZ+CtMQ67ebl0bfpySqHXGFG4sa/aq/G:oqvSGV39JeQ67eJiFG4sa/ayG

    Score
    9/10
    • Contacts a large (49329) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks