General

  • Target

    eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d.elf

  • Size

    29KB

  • Sample

    240419-cjw7hsdg44

  • MD5

    7c2da8202951debe176fc47541ae754c

  • SHA1

    ed011df676af41489ef38213af10b5c70831ec0d

  • SHA256

    eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d

  • SHA512

    d489bb706464baf4e6431077feb9ac5f85b6898e3faeffe06d3f093dbe59b80e7de5285743b0443ff1c512cfeefc223879d5adb2f0a321c5411aaf707bb4f4af

  • SSDEEP

    768:ELZW56tNDAFiY4FGG1Nn8MPDEzg6cHoC5Is7nbcuyD7U0/2j:FMtmij8wyVcj5dnouy8jj

Malware Config

Extracted

Family

mirai

Botnet

KYTON

Targets

    • Target

      eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d.elf

    • Size

      29KB

    • MD5

      7c2da8202951debe176fc47541ae754c

    • SHA1

      ed011df676af41489ef38213af10b5c70831ec0d

    • SHA256

      eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d

    • SHA512

      d489bb706464baf4e6431077feb9ac5f85b6898e3faeffe06d3f093dbe59b80e7de5285743b0443ff1c512cfeefc223879d5adb2f0a321c5411aaf707bb4f4af

    • SSDEEP

      768:ELZW56tNDAFiY4FGG1Nn8MPDEzg6cHoC5Is7nbcuyD7U0/2j:FMtmij8wyVcj5dnouy8jj

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (111541) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks