General

  • Target

    x86_32.nn.elf

  • Size

    73KB

  • Sample

    240905-v6k2wawdjk

  • MD5

    dfa9b26fce8474dfff4e1b8f4c589b33

  • SHA1

    851d6959f25dd15462a7558ed16d70b80b6da93d

  • SHA256

    f2e55aa291863c00940574fe98bf2fd6b7b2ea29402b976a9624320c4b432ebf

  • SHA512

    6583723ee5ad2e54310dbd301565c5e902321fd0dd41aa9c81797d576cf7fcc58283f8bac44f4f2f260ea34855f0c514b30bbc7c6de34940658125921ff6629b

  • SSDEEP

    1536:eWe6OJk4OSDqqp1o+gZjLu3Ww7UL31EeLFoOn/vHJr:elJnqH+2jy3su96t

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      x86_32.nn.elf

    • Size

      73KB

    • MD5

      dfa9b26fce8474dfff4e1b8f4c589b33

    • SHA1

      851d6959f25dd15462a7558ed16d70b80b6da93d

    • SHA256

      f2e55aa291863c00940574fe98bf2fd6b7b2ea29402b976a9624320c4b432ebf

    • SHA512

      6583723ee5ad2e54310dbd301565c5e902321fd0dd41aa9c81797d576cf7fcc58283f8bac44f4f2f260ea34855f0c514b30bbc7c6de34940658125921ff6629b

    • SSDEEP

      1536:eWe6OJk4OSDqqp1o+gZjLu3Ww7UL31EeLFoOn/vHJr:elJnqH+2jy3su96t

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

MITRE ATT&CK Enterprise v15

Tasks