General

  • Target

    8e5a6c67581db35245a580f3e6900961.bin

  • Size

    49KB

  • Sample

    241205-bymqysxldk

  • MD5

    dd5acf737f27404bd334b2d53f901214

  • SHA1

    fe626c7cece372270b8026db268057322a82c277

  • SHA256

    9df6843555cce2dc4dcf87b89d9e94bd9a78d487e0e061612b8de5140a186ff3

  • SHA512

    795608da2d33cfe36c1d2d45cfe76be5eaa5e35fb32ec4152f4c72942324edeee63b3d43cf56b78fae09be9c9e905000f966fd3984eae18ce1994563c8e9a5ae

  • SSDEEP

    768:AKcfwcblXcs8uDUvcJhGA81sRjAfddNc3eZAZ/gcdPugH1GPjUc336biM4OrzKNx:n6pdJXI1fMETDZAZHdPugHQIxuUw

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      b635d47afb00cd7dcc1a32c5ac9307c064be3918c230ae7c95e7f653a29c5f20.elf

    • Size

      108KB

    • MD5

      8e5a6c67581db35245a580f3e6900961

    • SHA1

      b8db9ab9b233d45dc365d3436f47d534fc3a5429

    • SHA256

      b635d47afb00cd7dcc1a32c5ac9307c064be3918c230ae7c95e7f653a29c5f20

    • SHA512

      6b204426a4c01000b93ef35812507fd9377949d8ddc0340d9a3d1b697881aa863c55a2c9ed67a19c0b6e7367fc2223b67e4134cd52e5b689cc79e00d4dfcaba1

    • SSDEEP

      1536:JvumDCpfSvaRyqTI1eNQ+OA8MtP44JoFD1a56Lz3mCLtCcnJbSq2QkkHIJv:gP6vaRX6eNQA8K44+F5YQ3ntxJ2HkHI

    • Contacts a large (75230) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks