General

  • Target

    main_x86.elf

  • Size

    44KB

  • Sample

    241206-fnjzja1pcz

  • MD5

    cbd31095fc9ce62c02b04ed61eaee1a6

  • SHA1

    e6a5df104379db435807ba2b89d728291327947e

  • SHA256

    71fec85ddee9e66b50341b0494d92b25333b1e148c14490fdc2e03f97173f09c

  • SHA512

    fece8e04c78a54a11c66710fd92ff2f40ee5186d655ac63d5ae379730aaf709240bdcb9aa8889446fef7e24686189ad1ea1cb6477fa2f91a25aaa964517268aa

  • SSDEEP

    768:yHHmunAhv1xoS24usX6Vrpv3htyfoGE4mLWPYlBCH+g3acygH:yHHRnAhv/oS24hXQpv5GEAPYfCeg3Jym

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      main_x86.elf

    • Size

      44KB

    • MD5

      cbd31095fc9ce62c02b04ed61eaee1a6

    • SHA1

      e6a5df104379db435807ba2b89d728291327947e

    • SHA256

      71fec85ddee9e66b50341b0494d92b25333b1e148c14490fdc2e03f97173f09c

    • SHA512

      fece8e04c78a54a11c66710fd92ff2f40ee5186d655ac63d5ae379730aaf709240bdcb9aa8889446fef7e24686189ad1ea1cb6477fa2f91a25aaa964517268aa

    • SSDEEP

      768:yHHmunAhv1xoS24usX6Vrpv3htyfoGE4mLWPYlBCH+g3acygH:yHHRnAhv/oS24hXQpv5GEAPYfCeg3Jym

    • Contacts a large (86370) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks