General

  • Target

    iwir64.elf

  • Size

    163KB

  • Sample

    241114-kwky1szndj

  • MD5

    86051ed9f16a14e387d8f1ca49929b8b

  • SHA1

    9bc8d6e8198830b082e26727a6a4f787108d3186

  • SHA256

    a282594c2838e6676dae420eb09052b30f7a3366bf0dc98af3ff11d87c247c16

  • SHA512

    88ccc46876991b423236a99aaaee85deb714557d1fc439a15aaaad0af0f7e428f42d3eb7fccc8b11c6d3121297cf45de08293c905a9c4938b3a893afc80a0096

  • SSDEEP

    3072:tQymKVauA93NInXoluIvOQz14injyUOrCeWwoWpps+PMsexs:myXVauA93NIn4lu0MWVWr+xs

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      iwir64.elf

    • Size

      163KB

    • MD5

      86051ed9f16a14e387d8f1ca49929b8b

    • SHA1

      9bc8d6e8198830b082e26727a6a4f787108d3186

    • SHA256

      a282594c2838e6676dae420eb09052b30f7a3366bf0dc98af3ff11d87c247c16

    • SHA512

      88ccc46876991b423236a99aaaee85deb714557d1fc439a15aaaad0af0f7e428f42d3eb7fccc8b11c6d3121297cf45de08293c905a9c4938b3a893afc80a0096

    • SSDEEP

      3072:tQymKVauA93NInXoluIvOQz14injyUOrCeWwoWpps+PMsexs:myXVauA93NIn4lu0MWVWr+xs

    • Contacts a large (49709) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks