General

  • Target

    ed7382c3202bca5f149c0143154468f62cd4b98b43254981f52d7f25a32d563b.elf

  • Size

    51KB

  • Sample

    250116-d87j8aznaz

  • MD5

    ba90717e35e660c77f5eed6441b2f9c4

  • SHA1

    c2b874723e5802b8ae6dd73388dd018d094904dc

  • SHA256

    ed7382c3202bca5f149c0143154468f62cd4b98b43254981f52d7f25a32d563b

  • SHA512

    aa45053da98c83f99612d415e5b017727176f3baba5ead285a4c0446a28dc5df3872bc9aa39cef2e1f249d6ef34bd9d8b0ba25137db5688b7383661c3a6964f4

  • SSDEEP

    768:q3ltpsNJvJkRbX8lF9nN+xVM+wJqRXHUnoocH+ZkHPESOrhS9X2/NPOBzGkUzg:6tYJwS9nNWTwJ6XHUn6+ZkvJQtYBas

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      ed7382c3202bca5f149c0143154468f62cd4b98b43254981f52d7f25a32d563b.elf

    • Size

      51KB

    • MD5

      ba90717e35e660c77f5eed6441b2f9c4

    • SHA1

      c2b874723e5802b8ae6dd73388dd018d094904dc

    • SHA256

      ed7382c3202bca5f149c0143154468f62cd4b98b43254981f52d7f25a32d563b

    • SHA512

      aa45053da98c83f99612d415e5b017727176f3baba5ead285a4c0446a28dc5df3872bc9aa39cef2e1f249d6ef34bd9d8b0ba25137db5688b7383661c3a6964f4

    • SSDEEP

      768:q3ltpsNJvJkRbX8lF9nN+xVM+wJqRXHUnoocH+ZkHPESOrhS9X2/NPOBzGkUzg:6tYJwS9nNWTwJ6XHUn6+ZkvJQtYBas

    • Contacts a large (112082) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

MITRE ATT&CK Enterprise v15

Tasks