General

  • Target

    x86_64.elf

  • Size

    65KB

  • Sample

    241120-wjbelazfke

  • MD5

    16d77c46f40723575ff92b080a29ab41

  • SHA1

    ee58b7c8380cbe910d40c460695712db3a8ce6ea

  • SHA256

    8bfab2040d743cc37f4f8e68f5b3b71c4579ef01ed5bf8ea427e80933c22c6a2

  • SHA512

    97119c04639ac4339f3177fd8ff518997f6d424677c6a357148f9c4e67ba61bb1c7cde8631b20f6f11e6d0fede1164d4be87f620bd6cf24ee647e9801d3c9ecc

  • SSDEEP

    1536:qvTKB+Q1jGAW8EX18d/DzS8X7rb7/aU0Ub:4Tuh1jRWlQ/Dz/X7r/aU0Ub

Malware Config

Extracted

Family

mirai

Botnet

TSUNAGU

C2

aiddoscnc.aisysmddos.com

aiddoscnc2.aisysmddos.com

Targets

    • Target

      x86_64.elf

    • Size

      65KB

    • MD5

      16d77c46f40723575ff92b080a29ab41

    • SHA1

      ee58b7c8380cbe910d40c460695712db3a8ce6ea

    • SHA256

      8bfab2040d743cc37f4f8e68f5b3b71c4579ef01ed5bf8ea427e80933c22c6a2

    • SHA512

      97119c04639ac4339f3177fd8ff518997f6d424677c6a357148f9c4e67ba61bb1c7cde8631b20f6f11e6d0fede1164d4be87f620bd6cf24ee647e9801d3c9ecc

    • SSDEEP

      1536:qvTKB+Q1jGAW8EX18d/DzS8X7rb7/aU0Ub:4Tuh1jRWlQ/Dz/X7r/aU0Ub

    • Contacts a large (76761) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks