General

  • Target

    rebirth.x86.elf

  • Size

    72KB

  • Sample

    241210-gamnyavpat

  • MD5

    c87a8c9dbe0035532b4f16fd0b962cab

  • SHA1

    ba5ed2d0af16ee5a1544a56f68d37e3822908b25

  • SHA256

    045f548b113bf0d7d77fad1ac21b97bd81ec84f894b637bf9e4278a1239f75c5

  • SHA512

    9d453f532581a6e5025c506d4bef484387fd73ce65776532889d8862e32091ab41e35306ba586f3fd03f1effa70ab11ec333c316c9a6e00c16c6f407e0ad3462

  • SSDEEP

    1536:C1aDNBMdqLIMpnrjuiyWPjgwPiZeXf66VDcXC6BEMNdXBlr3DFwbZn8:JNewUgn+pYjgDIy6+EMHBlTDFwbZn8

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      rebirth.x86.elf

    • Size

      72KB

    • MD5

      c87a8c9dbe0035532b4f16fd0b962cab

    • SHA1

      ba5ed2d0af16ee5a1544a56f68d37e3822908b25

    • SHA256

      045f548b113bf0d7d77fad1ac21b97bd81ec84f894b637bf9e4278a1239f75c5

    • SHA512

      9d453f532581a6e5025c506d4bef484387fd73ce65776532889d8862e32091ab41e35306ba586f3fd03f1effa70ab11ec333c316c9a6e00c16c6f407e0ad3462

    • SSDEEP

      1536:C1aDNBMdqLIMpnrjuiyWPjgwPiZeXf66VDcXC6BEMNdXBlr3DFwbZn8:JNewUgn+pYjgDIy6+EMHBlTDFwbZn8

    • Contacts a large (23830) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

MITRE ATT&CK Enterprise v15

Tasks