General

  • Target

    arm7.elf

  • Size

    169KB

  • Sample

    241221-xaj6tawndn

  • MD5

    361ad5318a419b87901ee5e007df7f01

  • SHA1

    26b5b5c4b12084b0809b079c04380b5e20889ae1

  • SHA256

    20fd8a6487fa9be0ccc353b5cbd9a2852081ee0f221a617a6d40030981b40153

  • SHA512

    2472650c58123537d8eea7e7567db06d8d6638dc0d5c79c9cda1f81d67167ac10023c2190a2c838d016be42730b0d193515b457441e09bc080a60156d357afde

  • SSDEEP

    3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKF85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN25+Lh

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      arm7.elf

    • Size

      169KB

    • MD5

      361ad5318a419b87901ee5e007df7f01

    • SHA1

      26b5b5c4b12084b0809b079c04380b5e20889ae1

    • SHA256

      20fd8a6487fa9be0ccc353b5cbd9a2852081ee0f221a617a6d40030981b40153

    • SHA512

      2472650c58123537d8eea7e7567db06d8d6638dc0d5c79c9cda1f81d67167ac10023c2190a2c838d016be42730b0d193515b457441e09bc080a60156d357afde

    • SSDEEP

      3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKF85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN25+Lh

    • Contacts a large (48734) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks