General

  • Target

    0de385e10d945493b3d23537431597e5bbb0e43e998c36707f41454d05897f26.elf

  • Size

    133KB

  • Sample

    240711-bfgrzszfkk

  • MD5

    f5404591a8df6c1df699f1972ab45a65

  • SHA1

    41f28a83cb98bb2cad73458278943ed318a68779

  • SHA256

    0de385e10d945493b3d23537431597e5bbb0e43e998c36707f41454d05897f26

  • SHA512

    e37a0bde520494baee248bcafea227748d8cb217990f71db518fb19c6de556ffbac7cd6ae82162ea50072f73bd37c9dd4c24bb511a961cd3e62e817894f56f65

  • SSDEEP

    3072:OAfRuiVUkjSv4d+TfJvWaFdCAnhsJhL+HeBg4xKql2TVvYbhj6b5M/9FLW3:df0iVUkjSv4d+TfJvHFdCAnhc+sg4xKb

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      0de385e10d945493b3d23537431597e5bbb0e43e998c36707f41454d05897f26.elf

    • Size

      133KB

    • MD5

      f5404591a8df6c1df699f1972ab45a65

    • SHA1

      41f28a83cb98bb2cad73458278943ed318a68779

    • SHA256

      0de385e10d945493b3d23537431597e5bbb0e43e998c36707f41454d05897f26

    • SHA512

      e37a0bde520494baee248bcafea227748d8cb217990f71db518fb19c6de556ffbac7cd6ae82162ea50072f73bd37c9dd4c24bb511a961cd3e62e817894f56f65

    • SSDEEP

      3072:OAfRuiVUkjSv4d+TfJvWaFdCAnhsJhL+HeBg4xKql2TVvYbhj6b5M/9FLW3:df0iVUkjSv4d+TfJvHFdCAnhc+sg4xKb

    Score
    9/10
    • Contacts a large (20505) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks