General

  • Target

    bot.mips.elf

  • Size

    91KB

  • Sample

    241215-xaqctsvjgq

  • MD5

    31705f87041270a9cfd56713c0ffff7e

  • SHA1

    11f55dd647341db9e9e70eaba7a5483672512dea

  • SHA256

    0a9412676c9dc6f4e1b642793f0b2289d7ca4fdbd028c8632c715f245ae209a1

  • SHA512

    30d2fdde0e417330faeeec69c9e31e922edcaf803b031dab0f91fe515d121d0191f71f507302fcec24b34e418a69a067c3fabc0cd2e91c30410086793cf0271f

  • SSDEEP

    1536:AKzqmzfphPukFhyxCXgHPveFz0H/DZ5mHZjvEY2QPMj:AKqYhuezWPveFwHF5mHZjvEzIU

Malware Config

Targets

    • Target

      bot.mips.elf

    • Size

      91KB

    • MD5

      31705f87041270a9cfd56713c0ffff7e

    • SHA1

      11f55dd647341db9e9e70eaba7a5483672512dea

    • SHA256

      0a9412676c9dc6f4e1b642793f0b2289d7ca4fdbd028c8632c715f245ae209a1

    • SHA512

      30d2fdde0e417330faeeec69c9e31e922edcaf803b031dab0f91fe515d121d0191f71f507302fcec24b34e418a69a067c3fabc0cd2e91c30410086793cf0271f

    • SSDEEP

      1536:AKzqmzfphPukFhyxCXgHPveFz0H/DZ5mHZjvEY2QPMj:AKqYhuezWPveFwHF5mHZjvEzIU

    • Contacts a large (201174) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks