General

  • Target

    20k.x86

  • Size

    53KB

  • Sample

    240521-x59d7aga61

  • MD5

    72d723a52bced01aad8eb7cdf73e08d7

  • SHA1

    c652b18291acb65483a80d15915d1b42c6c4bc35

  • SHA256

    99523964758d7ded3631bf0a2239681f4c408fc66dbe69db264dd9a77a3ce84c

  • SHA512

    fbdacfa094477a4691e43b0368c52f6d0b71df075e50e13d6276a6ab2b453f8ef531914655a6fc7043932907f158486ae94c9ea2868a3de64126ebe202b32896

  • SSDEEP

    1536:O13kynNjv6czSEZeLmI37KNCgoT9poQzWxS2RAfah5mQ:AUyntv6cuEZ437KAgohpoeiSi1D

Malware Config

Extracted

Family

mirai

Botnet

KURC

Targets

    • Target

      20k.x86

    • Size

      53KB

    • MD5

      72d723a52bced01aad8eb7cdf73e08d7

    • SHA1

      c652b18291acb65483a80d15915d1b42c6c4bc35

    • SHA256

      99523964758d7ded3631bf0a2239681f4c408fc66dbe69db264dd9a77a3ce84c

    • SHA512

      fbdacfa094477a4691e43b0368c52f6d0b71df075e50e13d6276a6ab2b453f8ef531914655a6fc7043932907f158486ae94c9ea2868a3de64126ebe202b32896

    • SSDEEP

      1536:O13kynNjv6czSEZeLmI37KNCgoT9poQzWxS2RAfah5mQ:AUyntv6cuEZ437KAgohpoeiSi1D

    Score
    9/10
    • Contacts a large (118131) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks