General

  • Target

    army7.elf

  • Size

    302KB

  • Sample

    250108-2w8thsxkft

  • MD5

    f800aac19067dd0808e5b08b056bcf11

  • SHA1

    14ebef4f03fea503330cd71255fbb1811628048b

  • SHA256

    58794be45bca0f8715403decd7264070767bd5e127f8409f089f81435b3268c5

  • SHA512

    0d85cd5ac1194b7676a863178d7eabec5481a553daa8b63691f298b060942111e2bfa2eaf3ca87d36da0c18c4e7a84679ca1183655d61850b435217243a1b219

  • SSDEEP

    6144:3JmkqPEIC5aWGSWYZH6KIhmTMLVCdukqM/9jmi3wq09aMNS:gkKER5azSWYZaKimIZCTD/hmi3/09aMM

Malware Config

Targets

    • Target

      army7.elf

    • Size

      302KB

    • MD5

      f800aac19067dd0808e5b08b056bcf11

    • SHA1

      14ebef4f03fea503330cd71255fbb1811628048b

    • SHA256

      58794be45bca0f8715403decd7264070767bd5e127f8409f089f81435b3268c5

    • SHA512

      0d85cd5ac1194b7676a863178d7eabec5481a553daa8b63691f298b060942111e2bfa2eaf3ca87d36da0c18c4e7a84679ca1183655d61850b435217243a1b219

    • SSDEEP

      6144:3JmkqPEIC5aWGSWYZH6KIhmTMLVCdukqM/9jmi3wq09aMNS:gkKER5azSWYZaKimIZCTD/hmi3/09aMM

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks