General

  • Target

    mips.elf

  • Size

    82KB

  • Sample

    241013-mjtfqssajc

  • MD5

    ab1e17348ecb8600904daaec82323bf0

  • SHA1

    852f74fc6ae2347bcb48a782814a2cd08114454a

  • SHA256

    fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd

  • SHA512

    a6c81e70e72d1fcc9bf5338d34c62edeedbd5490c002824a04197291b5dbc407b9e5b402edbe469134be4bd43ab3df3fdd06ba085f79060077492036ea711768

  • SSDEEP

    768:2ty6IP7M/kq0INRhfuN2Eo9tl/deyLYwHuRHI0I4EH6gTUh7ZDYovZ73x/nL8y8/:Rakdn2Eo3eQaV6T+RYo99Be037WZT

Malware Config

Extracted

Family

mirai

C2

net.tiktoka.cc

Targets

    • Target

      mips.elf

    • Size

      82KB

    • MD5

      ab1e17348ecb8600904daaec82323bf0

    • SHA1

      852f74fc6ae2347bcb48a782814a2cd08114454a

    • SHA256

      fcfeab84ca44e22503b2aacbccfce72fc79e9a6a1dca9e451e391960d7b02bbd

    • SHA512

      a6c81e70e72d1fcc9bf5338d34c62edeedbd5490c002824a04197291b5dbc407b9e5b402edbe469134be4bd43ab3df3fdd06ba085f79060077492036ea711768

    • SSDEEP

      768:2ty6IP7M/kq0INRhfuN2Eo9tl/deyLYwHuRHI0I4EH6gTUh7ZDYovZ73x/nL8y8/:Rakdn2Eo3eQaV6T+RYo99Be037WZT

    • Contacts a large (37623) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks