General

  • Target

    1589-1-0x0000000000400000-0x0000000000610ca0-memory.dmp

  • Size

    64KB

  • Sample

    241212-sdyfdszlfm

  • MD5

    a5eb35fa155aec4f872a5c752d1b7b83

  • SHA1

    81577c857bf855339c645122e7261b77a145cf32

  • SHA256

    110bf5dbc26ca732a7fb8243fe4fbc01901b00316740e3fd1233b873e43fee7e

  • SHA512

    9179d08c932a6069310284b53892fe3be48538a930ea16d52055212e01c1144e28915db871cda429efad73b07f71ff48e5845add9185e060c0afdb5095b1680a

  • SSDEEP

    768:6z9wYLdOQfNMe7PCP7eI3lJUxdUCKa5TENMqKAbFJD4sfIwlILlBkMsU99:0d5jieMqI1JSdwYCeAxJDhfhlILkRUv

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      1589-1-0x0000000000400000-0x0000000000610ca0-memory.dmp

    • Size

      64KB

    • MD5

      a5eb35fa155aec4f872a5c752d1b7b83

    • SHA1

      81577c857bf855339c645122e7261b77a145cf32

    • SHA256

      110bf5dbc26ca732a7fb8243fe4fbc01901b00316740e3fd1233b873e43fee7e

    • SHA512

      9179d08c932a6069310284b53892fe3be48538a930ea16d52055212e01c1144e28915db871cda429efad73b07f71ff48e5845add9185e060c0afdb5095b1680a

    • SSDEEP

      768:6z9wYLdOQfNMe7PCP7eI3lJUxdUCKa5TENMqKAbFJD4sfIwlILlBkMsU99:0d5jieMqI1JSdwYCeAxJDhfhlILkRUv

    • Contacts a large (114098) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks