General

  • Target

    x86_64.elf

  • Size

    83KB

  • Sample

    241221-vs4l3atren

  • MD5

    c7277a62f575d79c24d019e359f6870c

  • SHA1

    0256f40a705576b25f2900cac9e8ab7fe161f2dd

  • SHA256

    74c69eaf7c5102cd9804ffcab45b5c6a6275cb128808354dc431d417e835f0b0

  • SHA512

    13adcc407e51bbb9014158c21cd9073c9527f2748cee1369b0fe6c3c0747d4e0ec8bf907612c18bff53daa16c9cdce2b3b5107dfbf1689e3b58e3193c6cb0e22

  • SSDEEP

    1536:GL7OTU+/YQ6ZYb1ZoSkMfbxSD279rwPeytnQd+iNamP5Um5rT61Jy:GLtsD6ZYb1ZVkMfbM279rIJQd+xM55r6

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      x86_64.elf

    • Size

      83KB

    • MD5

      c7277a62f575d79c24d019e359f6870c

    • SHA1

      0256f40a705576b25f2900cac9e8ab7fe161f2dd

    • SHA256

      74c69eaf7c5102cd9804ffcab45b5c6a6275cb128808354dc431d417e835f0b0

    • SHA512

      13adcc407e51bbb9014158c21cd9073c9527f2748cee1369b0fe6c3c0747d4e0ec8bf907612c18bff53daa16c9cdce2b3b5107dfbf1689e3b58e3193c6cb0e22

    • SSDEEP

      1536:GL7OTU+/YQ6ZYb1ZoSkMfbxSD279rwPeytnQd+iNamP5Um5rT61Jy:GLtsD6ZYb1ZVkMfbM279rIJQd+xM55r6

    • Contacts a large (48708) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks