General

  • Target

    iwir64.elf

  • Size

    151KB

  • Sample

    241126-bxdrnaxjcw

  • MD5

    bf4f248a88dbd1a115c59d8b2a063e05

  • SHA1

    83b61c1eed7f7cf3b11a02f3a4a5084a5da3bc2c

  • SHA256

    3dcdf4d1c56414f2ed9ba98d81b7465f7241723d1f625764c4c9152aefb175c7

  • SHA512

    8f36ca67e6086dd23756bd00d96a799baca11b94ee98e84cd356fdb78a33d9a5c13d0204434541716a4f3501243ddff5051b624dc23b713bd6f1429a9b67b937

  • SSDEEP

    3072:kFKc89CrNRj2Zy33Au2ZhCFwLF2zq3tLeC8Nm0lKD42F13iIu:kFKb9CrNRj2Zy3/wvLh85C331u

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      iwir64.elf

    • Size

      151KB

    • MD5

      bf4f248a88dbd1a115c59d8b2a063e05

    • SHA1

      83b61c1eed7f7cf3b11a02f3a4a5084a5da3bc2c

    • SHA256

      3dcdf4d1c56414f2ed9ba98d81b7465f7241723d1f625764c4c9152aefb175c7

    • SHA512

      8f36ca67e6086dd23756bd00d96a799baca11b94ee98e84cd356fdb78a33d9a5c13d0204434541716a4f3501243ddff5051b624dc23b713bd6f1429a9b67b937

    • SSDEEP

      3072:kFKc89CrNRj2Zy33Au2ZhCFwLF2zq3tLeC8Nm0lKD42F13iIu:kFKb9CrNRj2Zy3/wvLh85C331u

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks