General

  • Target

    Josho.mpsl.elf

  • Size

    69KB

  • Sample

    241210-w6ltvatjfz

  • MD5

    29d062f2f320c0b365243431e80e90f1

  • SHA1

    09eedc222bf7b13d4735f2acd65dff895fe6e660

  • SHA256

    94b8af2a35d19290ce247df4b4346f120f6f8474e31eb205a9689509f19f4865

  • SHA512

    29417d51d79cb3c5212cdee6a68ffcd30885284d83e6d1956d1c34149ccf723b2a8b0740f0fbfd00d10c595d6154fe1aabf20578d674aefce2e37f3cf58f6a78

  • SSDEEP

    768:QxNCJ0EYlDYhHnrwqsFDwLX3U6ngBhN6PNUpGXS5SyeweVKe0n3oNWpkmPqXitMF:QxNCJBYlZFwwjhwPTXSNxIKzn6CpC

Malware Config

Extracted

Family

mirai

Botnet

JOSHO

Targets

    • Target

      Josho.mpsl.elf

    • Size

      69KB

    • MD5

      29d062f2f320c0b365243431e80e90f1

    • SHA1

      09eedc222bf7b13d4735f2acd65dff895fe6e660

    • SHA256

      94b8af2a35d19290ce247df4b4346f120f6f8474e31eb205a9689509f19f4865

    • SHA512

      29417d51d79cb3c5212cdee6a68ffcd30885284d83e6d1956d1c34149ccf723b2a8b0740f0fbfd00d10c595d6154fe1aabf20578d674aefce2e37f3cf58f6a78

    • SSDEEP

      768:QxNCJ0EYlDYhHnrwqsFDwLX3U6ngBhN6PNUpGXS5SyeweVKe0n3oNWpkmPqXitMF:QxNCJBYlZFwwjhwPTXSNxIKzn6CpC

    • Contacts a large (82224) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks