General

  • Target

    arm.elf

  • Size

    82KB

  • Sample

    241219-ta2t3svpgj

  • MD5

    45e89a8836946f8640ffd290aa7c17f0

  • SHA1

    f8a488d66f4b76bd0a5ed3364c326ae9ce12250a

  • SHA256

    8ffd6557e3087e828f71722290691b4154ca98ecbf1b9e975937d144b59ee0ef

  • SHA512

    026ad6cf263c3e5be34aeca2bba06fd7448a500b066ac21c91e813d71c8efb76f8a929848552f68579afd99dcf6552befc39ae2886820f4c0d82eee9d784a141

  • SSDEEP

    1536:knw+Wfc1UXsK1trBtb9r5c2jevjKeZWo5NJ46wiGkogijOv1F4:kwBfc61QvWwV/O6jpB1F4

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      arm.elf

    • Size

      82KB

    • MD5

      45e89a8836946f8640ffd290aa7c17f0

    • SHA1

      f8a488d66f4b76bd0a5ed3364c326ae9ce12250a

    • SHA256

      8ffd6557e3087e828f71722290691b4154ca98ecbf1b9e975937d144b59ee0ef

    • SHA512

      026ad6cf263c3e5be34aeca2bba06fd7448a500b066ac21c91e813d71c8efb76f8a929848552f68579afd99dcf6552befc39ae2886820f4c0d82eee9d784a141

    • SSDEEP

      1536:knw+Wfc1UXsK1trBtb9r5c2jevjKeZWo5NJ46wiGkogijOv1F4:kwBfc61QvWwV/O6jpB1F4

    • Contacts a large (48634) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks