General

  • Target

    x86_64.elf

  • Size

    49KB

  • Sample

    250115-r6ey3svrhz

  • MD5

    8009c6add42a8503ba07974025f30f7f

  • SHA1

    3aa5119043c6f2bdd546d4963dc1d0ee478f2f8c

  • SHA256

    04112cfea5c0f9bfcebbb0de9b42645b81de8bef4028bfd315d43b3daee49674

  • SHA512

    2b2ccc906038410349d406cfde4a83153f8da6f19c33ab24c22b6e8d112a3769e72e8a49656c55489b90d06dba267ad8f59b6ec30e42dedb8075302e3b2b8162

  • SSDEEP

    1536:z2Cjz+rGHUo+iwYRkawchfD1EPtAFQPfkq:Vj6iHUmwYqs1EPtjfk

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      x86_64.elf

    • Size

      49KB

    • MD5

      8009c6add42a8503ba07974025f30f7f

    • SHA1

      3aa5119043c6f2bdd546d4963dc1d0ee478f2f8c

    • SHA256

      04112cfea5c0f9bfcebbb0de9b42645b81de8bef4028bfd315d43b3daee49674

    • SHA512

      2b2ccc906038410349d406cfde4a83153f8da6f19c33ab24c22b6e8d112a3769e72e8a49656c55489b90d06dba267ad8f59b6ec30e42dedb8075302e3b2b8162

    • SSDEEP

      1536:z2Cjz+rGHUo+iwYRkawchfD1EPtAFQPfkq:Vj6iHUmwYqs1EPtjfk

    • Contacts a large (114141) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks