General

  • Target

    botx.arm.elf

  • Size

    66KB

  • Sample

    240717-nxvrdsygpr

  • MD5

    5d5526121b2523e0529dfae885bbd0e6

  • SHA1

    530a0fe8e41110f48ca38a7245aa9a1d4be4e297

  • SHA256

    36112baf999e30b224975360b50eff88b92a0231e432e012a8d346b66470b3af

  • SHA512

    6f2499e8ee44619d26797ca9efa2535dd4c795ffcfa1a90935c25352a8ad4958a131b1b81ac29ae286c69beefc1a93819952daa3d169370a10ffb1faa51eb8c5

  • SSDEEP

    1536:JHQr+CVG1Jb4k8ixG3tcs5QFC2Zw+fXFSewOYlTb+10mPvR:mr+71Z4JixGKs5Qc4pvFSewOKTe/

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

CONDI

C2

report.condinet.cf

Targets

    • Target

      botx.arm.elf

    • Size

      66KB

    • MD5

      5d5526121b2523e0529dfae885bbd0e6

    • SHA1

      530a0fe8e41110f48ca38a7245aa9a1d4be4e297

    • SHA256

      36112baf999e30b224975360b50eff88b92a0231e432e012a8d346b66470b3af

    • SHA512

      6f2499e8ee44619d26797ca9efa2535dd4c795ffcfa1a90935c25352a8ad4958a131b1b81ac29ae286c69beefc1a93819952daa3d169370a10ffb1faa51eb8c5

    • SSDEEP

      1536:JHQr+CVG1Jb4k8ixG3tcs5QFC2Zw+fXFSewOYlTb+10mPvR:mr+71Z4JixGKs5Qc4pvFSewOKTe/

    Score
    9/10
    • Contacts a large (53734) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks