General

  • Target

    39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8.elf

  • Size

    45KB

  • Sample

    241120-pb56nswqay

  • MD5

    1ca380662c9ca375f453b797dca7c230

  • SHA1

    724b9fc6060d239c8be3a67734222a158099e1ef

  • SHA256

    39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8

  • SHA512

    73ca7923b6657d98134954c9db8d3e73b1cb9c41a54583914a1733e41fb495d46dde7b131fb6aa51324429793fffe68b2024523da283c841ff7749eebd2f3c43

  • SSDEEP

    768:maMd0PgGLhqtP3GOTVTbO/CX53fudNfGHiaWB8bcBq62xhHwsAM:mac/GUPpqNfkSYcBqnxhHn/

Malware Config

Extracted

Family

mirai

C2

193.84.71.119

89.190.156.145

Targets

    • Target

      39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8.elf

    • Size

      45KB

    • MD5

      1ca380662c9ca375f453b797dca7c230

    • SHA1

      724b9fc6060d239c8be3a67734222a158099e1ef

    • SHA256

      39964833437fed0f7d35c2972c72700f5893efa77ffcfa77306c96b7f4954ff8

    • SHA512

      73ca7923b6657d98134954c9db8d3e73b1cb9c41a54583914a1733e41fb495d46dde7b131fb6aa51324429793fffe68b2024523da283c841ff7749eebd2f3c43

    • SSDEEP

      768:maMd0PgGLhqtP3GOTVTbO/CX53fudNfGHiaWB8bcBq62xhHwsAM:mac/GUPpqNfkSYcBqnxhHn/

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks