General

  • Target

    x86.elf

  • Size

    77KB

  • Sample

    241221-tfbj3sslet

  • MD5

    a502ac9de4ec361b154701997bb56f9e

  • SHA1

    239a8b683f3ff2ebd8ca139267adddfa1b6bc294

  • SHA256

    7a9cc801d7121f2acafe1b3463a106314cb187432cd71974ffbb31ccdf19154a

  • SHA512

    01ee670cd77c0bbd93737a9d7e043eef8e9573ffb0e8b90cdbfe2a7810204581961cb5cbf2538298217ec56ca3f93f07ef1f8dadd5af21440536044905b141f9

  • SSDEEP

    1536:9//+vex62dbPz7TL9xoBYrZboXWKwBvlIlXtM7ufYAeNcKEPcOKAuu3F8M:9//+Wx62dbPz7TL9xlZboGKwBvlIlXv+

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      x86.elf

    • Size

      77KB

    • MD5

      a502ac9de4ec361b154701997bb56f9e

    • SHA1

      239a8b683f3ff2ebd8ca139267adddfa1b6bc294

    • SHA256

      7a9cc801d7121f2acafe1b3463a106314cb187432cd71974ffbb31ccdf19154a

    • SHA512

      01ee670cd77c0bbd93737a9d7e043eef8e9573ffb0e8b90cdbfe2a7810204581961cb5cbf2538298217ec56ca3f93f07ef1f8dadd5af21440536044905b141f9

    • SSDEEP

      1536:9//+vex62dbPz7TL9xoBYrZboXWKwBvlIlXtM7ufYAeNcKEPcOKAuu3F8M:9//+Wx62dbPz7TL9xlZboGKwBvlIlXv+

    • Contacts a large (48712) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks