General

  • Target

    mips.elf

  • Size

    98KB

  • Sample

    241219-ta2t3svpfr

  • MD5

    0c47f6ec2de5ce4fe397255708f9649c

  • SHA1

    74d9e5ba3453fae8eb4165dba7f4b31266f06188

  • SHA256

    e48f4404b0a3550b109b8e376d01821cc37c6b73e459c548751ef2c806acdf76

  • SHA512

    f72cdd1b6a3e554f96af76331a8a8df946bf53c157ccae0e3ee172ec710c16ef0a04f17d11440efb8d69c864606b8a03907f8b1b67ca4385e5f61ab745ff6e66

  • SSDEEP

    1536:N9/x36i07pvIk00vVFfz12wvysuwj/zqQSdsu2ey5Nzo1Xu:Tx3e71C0dlrysljNSdsuC+1Xu

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      mips.elf

    • Size

      98KB

    • MD5

      0c47f6ec2de5ce4fe397255708f9649c

    • SHA1

      74d9e5ba3453fae8eb4165dba7f4b31266f06188

    • SHA256

      e48f4404b0a3550b109b8e376d01821cc37c6b73e459c548751ef2c806acdf76

    • SHA512

      f72cdd1b6a3e554f96af76331a8a8df946bf53c157ccae0e3ee172ec710c16ef0a04f17d11440efb8d69c864606b8a03907f8b1b67ca4385e5f61ab745ff6e66

    • SSDEEP

      1536:N9/x36i07pvIk00vVFfz12wvysuwj/zqQSdsu2ey5Nzo1Xu:Tx3e71C0dlrysljNSdsuC+1Xu

    • Contacts a large (48628) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks