General

  • Target

    33a8f48fbd45a071419a7213affd014d.elf

  • Size

    106KB

  • Sample

    240628-v3pwnaxejc

  • MD5

    33a8f48fbd45a071419a7213affd014d

  • SHA1

    ab024426e73c70f8e5eb0903080e81444bcef54b

  • SHA256

    ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d

  • SHA512

    75bd9de735baa8daa0e0ff3cc4ab942134bd3948097e8385bf410ad345643b370f02ef3e8ddf6002745e64524cbbcccd170a4fdf10036ee253e962fd6ef571dc

  • SSDEEP

    3072:2bB8eJ2RC0w4NQJYrFzguMAt8nrMjrkvB9wrVMtvAT00LKrcTw0nINLzsrI5:2bB8w2fNW9cTw0nINLzsr

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      33a8f48fbd45a071419a7213affd014d.elf

    • Size

      106KB

    • MD5

      33a8f48fbd45a071419a7213affd014d

    • SHA1

      ab024426e73c70f8e5eb0903080e81444bcef54b

    • SHA256

      ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d

    • SHA512

      75bd9de735baa8daa0e0ff3cc4ab942134bd3948097e8385bf410ad345643b370f02ef3e8ddf6002745e64524cbbcccd170a4fdf10036ee253e962fd6ef571dc

    • SSDEEP

      3072:2bB8eJ2RC0w4NQJYrFzguMAt8nrMjrkvB9wrVMtvAT00LKrcTw0nINLzsrI5:2bB8w2fNW9cTw0nINLzsr

    Score
    7/10
    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks