General

  • Target

    7fc427346b96920298ee49258f3bccd5ff4f35026357615f92e17d7c3a37c797.elf

  • Size

    44KB

  • Sample

    240423-bwrl5aba6t

  • MD5

    9c9467e1593b3b250413fb474c8a5263

  • SHA1

    c5f0bcfc3a5d2d88839ab1f72ae051fa5e35c1f7

  • SHA256

    7fc427346b96920298ee49258f3bccd5ff4f35026357615f92e17d7c3a37c797

  • SHA512

    5c020063ed3f8bb063851b9aac6504993f333baa2a3df55dd237209637dd15bba7131785bc470797a044bebc51b8a91a36d8b02cd4030d9a39f0897c820dc71d

  • SSDEEP

    768:uQX9L/vSkW5bVNPcb29pmQoINfhc0F1OyrPbqCfeiB75pWMd8:7J6L7N62iQDRhLF1OczlBK

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      7fc427346b96920298ee49258f3bccd5ff4f35026357615f92e17d7c3a37c797.elf

    • Size

      44KB

    • MD5

      9c9467e1593b3b250413fb474c8a5263

    • SHA1

      c5f0bcfc3a5d2d88839ab1f72ae051fa5e35c1f7

    • SHA256

      7fc427346b96920298ee49258f3bccd5ff4f35026357615f92e17d7c3a37c797

    • SHA512

      5c020063ed3f8bb063851b9aac6504993f333baa2a3df55dd237209637dd15bba7131785bc470797a044bebc51b8a91a36d8b02cd4030d9a39f0897c820dc71d

    • SSDEEP

      768:uQX9L/vSkW5bVNPcb29pmQoINfhc0F1OyrPbqCfeiB75pWMd8:7J6L7N62iQDRhLF1OczlBK

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Contacts a large (168133) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies systemd

      Adds/ modifies systemd service files. Likely to achieve persistence.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

System Information Discovery

1
T1082

Tasks