General

  • Target

    TRC.arm7.elf

  • Size

    151KB

  • Sample

    241214-vxjsfs1jdp

  • MD5

    4a23530dbc9670bce65f32924f89cc5e

  • SHA1

    e8080ac306fd7b917a0e1b8e0f98b70f4bb8a5bc

  • SHA256

    9efbf31d6e27540eba5069725740b9eecc381a81f23cbfb80d0efeed7c839691

  • SHA512

    0469708b9995631b8f4af56ff8dd95bc17f30b0e9378cf9818e2cfd120a87e9c6f14c647cfcb220dce7a4b75a5d8f535e0bac5eeea4710d908d4fcd0b4da4bf3

  • SSDEEP

    3072:cYuS/Hp34dNxISv4d+TfJvWa2dCAnhcJhL9H9LBQZ2jxBOCL1WvVAM/9i/ym3:cYuS/HCdgSv4d+TfJvH2dCAnhs9NBQZ+

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      TRC.arm7.elf

    • Size

      151KB

    • MD5

      4a23530dbc9670bce65f32924f89cc5e

    • SHA1

      e8080ac306fd7b917a0e1b8e0f98b70f4bb8a5bc

    • SHA256

      9efbf31d6e27540eba5069725740b9eecc381a81f23cbfb80d0efeed7c839691

    • SHA512

      0469708b9995631b8f4af56ff8dd95bc17f30b0e9378cf9818e2cfd120a87e9c6f14c647cfcb220dce7a4b75a5d8f535e0bac5eeea4710d908d4fcd0b4da4bf3

    • SSDEEP

      3072:cYuS/Hp34dNxISv4d+TfJvWa2dCAnhcJhL9H9LBQZ2jxBOCL1WvVAM/9i/ym3:cYuS/HCdgSv4d+TfJvH2dCAnhs9NBQZ+

    • Contacts a large (20443) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks