General

  • Target

    7e05474890a7478e1623b219c73d6b1dad09cc3960c0001ed71587234c7768e9.elf

  • Size

    60KB

  • Sample

    240629-bwqptsxfpb

  • MD5

    89d2011fff1535f1811d61657ea0820c

  • SHA1

    782b7871ec3758b0fccd720b2fc7f155d3a2cddc

  • SHA256

    7e05474890a7478e1623b219c73d6b1dad09cc3960c0001ed71587234c7768e9

  • SHA512

    9fcf76b88ab0da9c42e23fff5592e2e5527bb60c6d6cd02f6e000460ecfce0c5938080b61c732d757e9dea83c2a35e5681628fd983a45afa04aabf769316be6f

  • SSDEEP

    768:BD4fWkmkexEb2thXQ9MnK+jbiL5CtKY1RlgF36OvJVHbHzDMK:Bfmb2thXQ9MKYy5FmlmL7T

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      7e05474890a7478e1623b219c73d6b1dad09cc3960c0001ed71587234c7768e9.elf

    • Size

      60KB

    • MD5

      89d2011fff1535f1811d61657ea0820c

    • SHA1

      782b7871ec3758b0fccd720b2fc7f155d3a2cddc

    • SHA256

      7e05474890a7478e1623b219c73d6b1dad09cc3960c0001ed71587234c7768e9

    • SHA512

      9fcf76b88ab0da9c42e23fff5592e2e5527bb60c6d6cd02f6e000460ecfce0c5938080b61c732d757e9dea83c2a35e5681628fd983a45afa04aabf769316be6f

    • SSDEEP

      768:BD4fWkmkexEb2thXQ9MnK+jbiL5CtKY1RlgF36OvJVHbHzDMK:Bfmb2thXQ9MKYy5FmlmL7T

    Score
    9/10
    • Contacts a large (23828) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks