General

  • Target

    cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c.elf

  • Size

    142KB

  • Sample

    240708-bt2z3swbpq

  • MD5

    d47422fe652ea0952b4b42cd69a5511e

  • SHA1

    7785352a4e80cbcd589a68445282ffa99af460f6

  • SHA256

    cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c

  • SHA512

    d6cf68dd04d2c375300fd936156d856b5f8a699de62e73537809bc588fddb83da8828787a71a0926b3f3e84d241813fa75761a7e05952339c042d3f6c66df66f

  • SSDEEP

    3072:Mogb9pOAFCtAdnEhI+/Hz8i24V/LLqNOEGZLlQoYkozm:Mor2IHz124VzLqN/GxlQFk1

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

C2

scan.yerco.xyz

Targets

    • Target

      cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c.elf

    • Size

      142KB

    • MD5

      d47422fe652ea0952b4b42cd69a5511e

    • SHA1

      7785352a4e80cbcd589a68445282ffa99af460f6

    • SHA256

      cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c

    • SHA512

      d6cf68dd04d2c375300fd936156d856b5f8a699de62e73537809bc588fddb83da8828787a71a0926b3f3e84d241813fa75761a7e05952339c042d3f6c66df66f

    • SSDEEP

      3072:Mogb9pOAFCtAdnEhI+/Hz8i24V/LLqNOEGZLlQoYkozm:Mor2IHz124VzLqN/GxlQFk1

    Score
    9/10
    • Contacts a large (299333) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks