General
-
Target
801c99e4f98a563c705771a06ef9290c3f1b262cec82e521a2f3f39641512e5f.elf
-
Size
103KB
-
Sample
250107-cy141ssjeq
-
MD5
ade42a2e91917e954524de04d1e3d86e
-
SHA1
a642bd1688b2758ccfe482fc467d6555f512141f
-
SHA256
801c99e4f98a563c705771a06ef9290c3f1b262cec82e521a2f3f39641512e5f
-
SHA512
2a4d2b577a6dda726670563dd9c6703579dfa2c9c53b98839d5adf9e0c85a1fbe3334257022f5337ee962d44625c7278af03b0ca704b82afd4fea9be5b588c94
-
SSDEEP
1536:zO9Bm/RtCZiqr33Dc48uuwr7CFKygt6c9e8WDC1ieMbFQIg:yBm/zCZiyn448uuPRgt6c9e8YC1GFQP
Behavioral task
behavioral1
Sample
801c99e4f98a563c705771a06ef9290c3f1b262cec82e521a2f3f39641512e5f.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
MIRAI
Targets
-
-
Target
801c99e4f98a563c705771a06ef9290c3f1b262cec82e521a2f3f39641512e5f.elf
-
Size
103KB
-
MD5
ade42a2e91917e954524de04d1e3d86e
-
SHA1
a642bd1688b2758ccfe482fc467d6555f512141f
-
SHA256
801c99e4f98a563c705771a06ef9290c3f1b262cec82e521a2f3f39641512e5f
-
SHA512
2a4d2b577a6dda726670563dd9c6703579dfa2c9c53b98839d5adf9e0c85a1fbe3334257022f5337ee962d44625c7278af03b0ca704b82afd4fea9be5b588c94
-
SSDEEP
1536:zO9Bm/RtCZiqr33Dc48uuwr7CFKygt6c9e8WDC1ieMbFQIg:yBm/zCZiyn448uuPRgt6c9e8YC1GFQP
-
Deletes itself
-
Deletes system logs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Modifies systemd
Adds/ modifies systemd service files. Likely to achieve persistence.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1Privilege Escalation
Boot or Logon Autostart Execution
1XDG Autostart Entries
1Create or Modify System Process
1Systemd Service
1