General

  • Target

    8eedeeb60f1f05cb6143fedac89b2a8501bf64f57b24bf6ab031df89760d7f92.elf

  • Size

    51KB

  • Sample

    250115-dg72nsylez

  • MD5

    8c66a273b7dbce2d3068cb6e41531f65

  • SHA1

    34969d7168d3935f0116eb37a55991306aec895f

  • SHA256

    8eedeeb60f1f05cb6143fedac89b2a8501bf64f57b24bf6ab031df89760d7f92

  • SHA512

    f3b31736a28d242d19cacd42e3c16f040c8c3793c40572c9fbaae844b8ae974c9c4ffe779234f3e71e4be360422ad7c9719d0855fe6030c017345b81907dcfff

  • SSDEEP

    768:j0QDd8eakzD4lR+YOANqN+QUV0Fji9qooxn5ZkHPLSxMPh6I/5/NPsB2gGVzJ:Vd5atOAN9RV0FW9qN5Zkvm69KBIt

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      8eedeeb60f1f05cb6143fedac89b2a8501bf64f57b24bf6ab031df89760d7f92.elf

    • Size

      51KB

    • MD5

      8c66a273b7dbce2d3068cb6e41531f65

    • SHA1

      34969d7168d3935f0116eb37a55991306aec895f

    • SHA256

      8eedeeb60f1f05cb6143fedac89b2a8501bf64f57b24bf6ab031df89760d7f92

    • SHA512

      f3b31736a28d242d19cacd42e3c16f040c8c3793c40572c9fbaae844b8ae974c9c4ffe779234f3e71e4be360422ad7c9719d0855fe6030c017345b81907dcfff

    • SSDEEP

      768:j0QDd8eakzD4lR+YOANqN+QUV0Fji9qooxn5ZkHPLSxMPh6I/5/NPsB2gGVzJ:Vd5atOAN9RV0FW9qN5Zkvm69KBIt

    • Contacts a large (106190) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks