General

  • Target

    botx.x86.elf

  • Size

    50KB

  • Sample

    241230-ep773sxpaw

  • MD5

    1092f7846a6ca7a5e92ece0ea93ff82e

  • SHA1

    140fd3e84c49d382e6b0f9a40730d1cd465f8347

  • SHA256

    a5ddb64df4b96bfeae6860981f98b4845df83db34ffaf238548bede6067f15c2

  • SHA512

    11ba6cdfba1784d5f2895f351def8d6a4dc0d5efd56b735978d1ff7416d2a52da07931250f37311362c8d522f7db89e3ac8bf1de890302afa6281ce2a2f6b2ba

  • SSDEEP

    768:ytYRSjaQ9DaZ/oJlExakbMqu8iz/nkvKy+hFlKTm/4RsvKQLDJCgMjz:WYRSjaCu1wlPbPly+hnKq/4G3LNCgMv

Malware Config

Extracted

Family

mirai

Botnet

CONDI

C2

botnet.tfmobile.store

report.tfmobile.store

Targets

    • Target

      botx.x86.elf

    • Size

      50KB

    • MD5

      1092f7846a6ca7a5e92ece0ea93ff82e

    • SHA1

      140fd3e84c49d382e6b0f9a40730d1cd465f8347

    • SHA256

      a5ddb64df4b96bfeae6860981f98b4845df83db34ffaf238548bede6067f15c2

    • SHA512

      11ba6cdfba1784d5f2895f351def8d6a4dc0d5efd56b735978d1ff7416d2a52da07931250f37311362c8d522f7db89e3ac8bf1de890302afa6281ce2a2f6b2ba

    • SSDEEP

      768:ytYRSjaQ9DaZ/oJlExakbMqu8iz/nkvKy+hFlKTm/4RsvKQLDJCgMjz:WYRSjaCu1wlPbPly+hnKq/4G3LNCgMv

    • Contacts a large (56036) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks