General

  • Target

    7793b23aea988f40ac595b0e980877e7.bin

  • Size

    29KB

  • Sample

    241217-btdmgsxjej

  • MD5

    0f715eb26ae9f3471c98d2ad98125295

  • SHA1

    dc6cdb05a8233797c7ae8d4e5ed99d7b2f3636c7

  • SHA256

    e49a7d787771f778a99ace07fdbc17f5286774a1833a04f6e174d9b5c91caebb

  • SHA512

    fa1ef7dc68f298f15bed5b83caef36f83c02a6ab4989a252089bd7cdbbd0e7d1c62ae933e71ddbb6c0b6423355253b9fb410ad8d6fbe990edc3c6d852b90ecca

  • SSDEEP

    768:6YUFHeW5RHUuNgDnmVd6VRoLHYrNbUWT64PK3RW:XEH9LHUkVd6VOLH8TwBW

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      52f5cec403912d29bbfe7daa6b10576f26e9fb7e3aa110e749e60d0b92fff59c.elf

    • Size

      57KB

    • MD5

      7793b23aea988f40ac595b0e980877e7

    • SHA1

      a4ef0db72634142b0d9124d5e7ecbd92722194ee

    • SHA256

      52f5cec403912d29bbfe7daa6b10576f26e9fb7e3aa110e749e60d0b92fff59c

    • SHA512

      27833103d1347e3b4c66036427fe99a6c122a628bc94312e3f4f33de238c321deb73a6541b6170394ac5a77aa1aaeae78a622f69fadc49af2f8e2c632695e29b

    • SSDEEP

      1536:KZnx4HVynObXFUOmVz1NzBQk8SRGJSlpa9p9l5vicj6v/pW:W4HV4mezbOknRGJSlpgBj6HpW

    • Contacts a large (638332) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks