General

  • Target

    elitebotnet.mpsl.elf

  • Size

    99KB

  • Sample

    250113-lhl5lazjhq

  • MD5

    3b2a8e0b62d3ffdba0543724d2a0761e

  • SHA1

    3655b74119e0b47bd06f474beacbc5ad6a870d81

  • SHA256

    e64a236cdba06f5e9831e9d6b2b4f1672e57f6c08a3c4d15df4447da82a918d0

  • SHA512

    e1ff9c89dfca7d6bfbdfaebbf43b7fc37da67062f9b3d22a44069ba138eb41e3b1a34a98c3f50dd0be279eaee20ae073afc17d70dea0a0693ee25434ffdd69b6

  • SSDEEP

    3072:6B1CUybA2iyeqyySZYK7ao/Ev8wbZnMZ7:6B1CUD2ieyySZYK7ao//wRMp

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

asdfui.elite-api.su

Targets

    • Target

      elitebotnet.mpsl.elf

    • Size

      99KB

    • MD5

      3b2a8e0b62d3ffdba0543724d2a0761e

    • SHA1

      3655b74119e0b47bd06f474beacbc5ad6a870d81

    • SHA256

      e64a236cdba06f5e9831e9d6b2b4f1672e57f6c08a3c4d15df4447da82a918d0

    • SHA512

      e1ff9c89dfca7d6bfbdfaebbf43b7fc37da67062f9b3d22a44069ba138eb41e3b1a34a98c3f50dd0be279eaee20ae073afc17d70dea0a0693ee25434ffdd69b6

    • SSDEEP

      3072:6B1CUybA2iyeqyySZYK7ao/Ev8wbZnMZ7:6B1CUD2ieyySZYK7ao//wRMp

    • Contacts a large (23833) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Modifies rc script

      Adding/modifying system rc scripts is a common persistence mechanism.

MITRE ATT&CK Enterprise v15

Tasks