General

  • Target

    Owari.mips.elf

  • Size

    67KB

  • Sample

    241209-lmma6atldw

  • MD5

    8b3d064758fe6a058398d1b082cc1b76

  • SHA1

    cfc3aeda3d2ea8f374803985504512e9f93a3094

  • SHA256

    162bf3d9a24db04c17935c9afd67cdaadbdf28e78ae3d384f9c3986bb384335b

  • SHA512

    5b0bbe41ca98a104dca28fe1a34eee775d8c58629730a80e915a41880bf83ec642c73cb94f42cef98d8cb2f21a1643d8b3fce1d07aad2265d6c2279003efecd9

  • SSDEEP

    1536:2VVUIa+SzL6P1rNVHV0vaEfKOYFRhOJmuE79ywo8eFp0:2VqIfVBNf0STDhO5PPHr0

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      Owari.mips.elf

    • Size

      67KB

    • MD5

      8b3d064758fe6a058398d1b082cc1b76

    • SHA1

      cfc3aeda3d2ea8f374803985504512e9f93a3094

    • SHA256

      162bf3d9a24db04c17935c9afd67cdaadbdf28e78ae3d384f9c3986bb384335b

    • SHA512

      5b0bbe41ca98a104dca28fe1a34eee775d8c58629730a80e915a41880bf83ec642c73cb94f42cef98d8cb2f21a1643d8b3fce1d07aad2265d6c2279003efecd9

    • SSDEEP

      1536:2VVUIa+SzL6P1rNVHV0vaEfKOYFRhOJmuE79ywo8eFp0:2VqIfVBNf0STDhO5PPHr0

    • Contacts a large (37855) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks