General

  • Target

    e375e85443f39040667ff53ded7c68996a7b96bdec629206b78a94d2e9fa449a.elf

  • Size

    49KB

  • Sample

    250107-dds4ca1jgz

  • MD5

    4921cecacbc29613c02c8ca9ad06c89d

  • SHA1

    6abd39503995370c9bb86327e4cb93ed602a6531

  • SHA256

    e375e85443f39040667ff53ded7c68996a7b96bdec629206b78a94d2e9fa449a

  • SHA512

    1983dfce54e0f0fd112281f1d048428ef78f087d65c868626df62dce0deefedb3a86e1a8627c8c3aa801a888fab44f708c280a28ca74749b409873e26bb6075d

  • SSDEEP

    1536:z2Cjz+rGHUo+iwYRk+wchfD1sPtAFQPfkq:Vj6iHUmwYqg1sPtjfk

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      e375e85443f39040667ff53ded7c68996a7b96bdec629206b78a94d2e9fa449a.elf

    • Size

      49KB

    • MD5

      4921cecacbc29613c02c8ca9ad06c89d

    • SHA1

      6abd39503995370c9bb86327e4cb93ed602a6531

    • SHA256

      e375e85443f39040667ff53ded7c68996a7b96bdec629206b78a94d2e9fa449a

    • SHA512

      1983dfce54e0f0fd112281f1d048428ef78f087d65c868626df62dce0deefedb3a86e1a8627c8c3aa801a888fab44f708c280a28ca74749b409873e26bb6075d

    • SSDEEP

      1536:z2Cjz+rGHUo+iwYRk+wchfD1sPtAFQPfkq:Vj6iHUmwYqg1sPtjfk

    • Contacts a large (110542) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks