General

  • Target

    33a8f48fbd45a071419a7213affd014d.bin

  • Size

    34KB

  • Sample

    240630-b1q66a1hnh

  • MD5

    100859f9bef5d1a0aa73d9928b9a5bea

  • SHA1

    2e21ee4b8e4843d9d5618add10c24f5f2335b0e5

  • SHA256

    a75b2303bb5cc48dc9e2f4fda497f97af3f187fcc788bbcf797af07d8d71375f

  • SHA512

    6999fd0dd0ac78ea2e8a722d6d0fe5a00fcd68a7c456dfe5a316ee97963853ca00376d8eb06fcbd58a3d7d896a5fdbbfab9bea9a0871879ad32c91e91c7e4077

  • SSDEEP

    768:Er6qjRLmL3/+IcU5f1jHe8Hu9CoPvPrpstKskjclHk+ujl:EbJO2bU5ZHO9CWXFsSYlHkbl

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d.elf

    • Size

      106KB

    • MD5

      33a8f48fbd45a071419a7213affd014d

    • SHA1

      ab024426e73c70f8e5eb0903080e81444bcef54b

    • SHA256

      ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d

    • SHA512

      75bd9de735baa8daa0e0ff3cc4ab942134bd3948097e8385bf410ad345643b370f02ef3e8ddf6002745e64524cbbcccd170a4fdf10036ee253e962fd6ef571dc

    • SSDEEP

      3072:2bB8eJ2RC0w4NQJYrFzguMAt8nrMjrkvB9wrVMtvAT00LKrcTw0nINLzsrI5:2bB8w2fNW9cTw0nINLzsr

    Score
    7/10
    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks