General

  • Target

    636f2bb514e461c2914afa64f05550d18579e58d0404a2f914449068f9ed6f86.elf

  • Size

    79KB

  • Sample

    241210-c9b92awmdk

  • MD5

    f38da917978d88855ecf8da376ddca08

  • SHA1

    80875703d185d63d9c50bb769f713792b36e0f12

  • SHA256

    636f2bb514e461c2914afa64f05550d18579e58d0404a2f914449068f9ed6f86

  • SHA512

    21a4d364c11420f163d08780d868a6d067025a1ec01bf10ed64f33d02726c89971375f06aaaa1d5be12639457776d6ae0b389f3fdca14d805b473376a1cbf7d7

  • SSDEEP

    1536:SuSFceW8JP33UBLwYpWoPPcsVsSbBD1OVeBSFR:/SqeT3EB8M1Of

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      636f2bb514e461c2914afa64f05550d18579e58d0404a2f914449068f9ed6f86.elf

    • Size

      79KB

    • MD5

      f38da917978d88855ecf8da376ddca08

    • SHA1

      80875703d185d63d9c50bb769f713792b36e0f12

    • SHA256

      636f2bb514e461c2914afa64f05550d18579e58d0404a2f914449068f9ed6f86

    • SHA512

      21a4d364c11420f163d08780d868a6d067025a1ec01bf10ed64f33d02726c89971375f06aaaa1d5be12639457776d6ae0b389f3fdca14d805b473376a1cbf7d7

    • SSDEEP

      1536:SuSFceW8JP33UBLwYpWoPPcsVsSbBD1OVeBSFR:/SqeT3EB8M1Of

    • Contacts a large (18236) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks