General

  • Target

    jew.arm7.elf

  • Size

    133KB

  • Sample

    241209-epm7xazjbw

  • MD5

    7cb9ff4f5e6d17064d56589713b95b08

  • SHA1

    78be0c2c7839165a18c8c5aa15f81c902d17b855

  • SHA256

    672bb3b2ece2e6406e7cc74e03242946d5fb728852a7063fd56858c0c646dd6c

  • SHA512

    952fc55bf67b80b36dd9b66733dd2162b00b667fe9b518ab935161e816fae050ac10a0fc17d5444f0769815a43fa4547d10c2061136afe17e915c115207e6bb7

  • SSDEEP

    3072:5KacBqVuJVkW5IOPZoxNOqMP0wctzHnDPF+84/M/92L18Yj:kacBQuJVkW5IOaxNOqMPVovF+8MM/9Zc

Malware Config

Extracted

Family

mirai

Botnet

KURC

Targets

    • Target

      jew.arm7.elf

    • Size

      133KB

    • MD5

      7cb9ff4f5e6d17064d56589713b95b08

    • SHA1

      78be0c2c7839165a18c8c5aa15f81c902d17b855

    • SHA256

      672bb3b2ece2e6406e7cc74e03242946d5fb728852a7063fd56858c0c646dd6c

    • SHA512

      952fc55bf67b80b36dd9b66733dd2162b00b667fe9b518ab935161e816fae050ac10a0fc17d5444f0769815a43fa4547d10c2061136afe17e915c115207e6bb7

    • SSDEEP

      3072:5KacBqVuJVkW5IOPZoxNOqMP0wctzHnDPF+84/M/92L18Yj:kacBQuJVkW5IOaxNOqMPVovF+8MM/9Zc

    • Contacts a large (115776) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks