General

  • Target

    Owari.arm7.elf

  • Size

    123KB

  • Sample

    241209-lmma6atldx

  • MD5

    51b28a35cc1088a020edbe47b71390f0

  • SHA1

    e6f8df72ae3c98f31ae53e1fa0fca975419877d1

  • SHA256

    dd7fcf5834e68575c45bf03995cfaf8acd7085f0e7f04bef772fd4faa435c264

  • SHA512

    959317cf139ad090c93750e4ab89afb98bc82da45881688d297630ad22adba7970f61411d0620e4c4ff275a54ccf7221669dd75a90a570b282eae136d912c442

  • SSDEEP

    3072:tc/BCltnde5hLckPBrPDVpN+Gt4GmxoWM/9xM/:O/BCltnAcErPDVpgGlmxjM/9xM/

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      Owari.arm7.elf

    • Size

      123KB

    • MD5

      51b28a35cc1088a020edbe47b71390f0

    • SHA1

      e6f8df72ae3c98f31ae53e1fa0fca975419877d1

    • SHA256

      dd7fcf5834e68575c45bf03995cfaf8acd7085f0e7f04bef772fd4faa435c264

    • SHA512

      959317cf139ad090c93750e4ab89afb98bc82da45881688d297630ad22adba7970f61411d0620e4c4ff275a54ccf7221669dd75a90a570b282eae136d912c442

    • SSDEEP

      3072:tc/BCltnde5hLckPBrPDVpN+Gt4GmxoWM/9xM/:O/BCltnAcErPDVpgGlmxjM/9xM/

    • Contacts a large (48050) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks