General

  • Target

    arm7.elf

  • Size

    147KB

  • Sample

    241109-wfp4kssjdp

  • MD5

    60eb053a327610867e602054a599fece

  • SHA1

    5779d2d820010845048b7d674fa2aef670feeb21

  • SHA256

    7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b

  • SHA512

    ee02c52a057efd71aa953bbb776ee556fac9b0aeaa9f9c175e8bfb235d29ef0306cb1668015558c699fa622c3f72c2eae80423045d460e3cbb3ce32c92561e1a

  • SSDEEP

    3072:CJLce3pC5mj7naLHbz4N9GUJURIJ1FEEXkkTM/9oIMY:CJLcefnaLHbz4NMUJdHEEXkYM/9LMY

Malware Config

Extracted

Family

mirai

C2

net.tiktoka.cc

Targets

    • Target

      arm7.elf

    • Size

      147KB

    • MD5

      60eb053a327610867e602054a599fece

    • SHA1

      5779d2d820010845048b7d674fa2aef670feeb21

    • SHA256

      7b7abb5de56c4244a7ce22680ee1e85d7632b2b66ff020babffb0ae78abce65b

    • SHA512

      ee02c52a057efd71aa953bbb776ee556fac9b0aeaa9f9c175e8bfb235d29ef0306cb1668015558c699fa622c3f72c2eae80423045d460e3cbb3ce32c92561e1a

    • SSDEEP

      3072:CJLce3pC5mj7naLHbz4N9GUJURIJ1FEEXkkTM/9oIMY:CJLcefnaLHbz4NMUJdHEEXkYM/9LMY

    • Contacts a large (37368) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks