General

  • Target

    x86_64

  • Size

    76KB

  • Sample

    241219-s847esvldv

  • MD5

    20298e228b90c88533efc7d574affdfb

  • SHA1

    f42ea8d586accb5ce87f032e984f3661f567f31e

  • SHA256

    f136e57f0012699ff8ca132a6f5ce47fb6f833cddb9124f234dac51709009734

  • SHA512

    e11c7913a23c3c1739fc7e89cc835ae38ccc1073f07a7c0667cad70878691deb3b7318539d6140c0ce4927527a4cfdcb8f2a378ca660bfb03a794958159e32ac

  • SSDEEP

    1536:Yi1YUwiH1q2S+levBG+2U2hG90hCy2++Eg95YFVC6wAZ:YieGVq2S+0vBGa2cYn2+M95+C6wAZ

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      x86_64

    • Size

      76KB

    • MD5

      20298e228b90c88533efc7d574affdfb

    • SHA1

      f42ea8d586accb5ce87f032e984f3661f567f31e

    • SHA256

      f136e57f0012699ff8ca132a6f5ce47fb6f833cddb9124f234dac51709009734

    • SHA512

      e11c7913a23c3c1739fc7e89cc835ae38ccc1073f07a7c0667cad70878691deb3b7318539d6140c0ce4927527a4cfdcb8f2a378ca660bfb03a794958159e32ac

    • SSDEEP

      1536:Yi1YUwiH1q2S+levBG+2U2hG90hCy2++Eg95YFVC6wAZ:YieGVq2S+0vBGa2cYn2+M95+C6wAZ

    • Contacts a large (7573) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks