General

  • Target

    x86

  • Size

    45KB

  • Sample

    250129-taq3ks1kbj

  • MD5

    2fecd2ea233a6a25108b24507ed42d92

  • SHA1

    13a4bbad492664537a17eaca0ce8e1438ea61e73

  • SHA256

    76be449e67d2c68c75ff0312a50904140cde0a479968f0fe32192bb9a7e76782

  • SHA512

    5440d9f5393fa279c09683bb8d605322398427e915a863703e8768995b2827bb219591005b0ed8bdc6a8cdeca1d027a800bf4d341f9d59428b6a0c9e6e3392d6

  • SSDEEP

    768:xk/LjSNwrGBs80WEe9lyXR2k4kHgMVfM1gY4/UGZXTfOEmo3kP:xk/LjSNwrGBzFEZpgHt4JZXTfObo3k

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

C2

elitexrebirth.elite-api.su

Targets

    • Target

      x86

    • Size

      45KB

    • MD5

      2fecd2ea233a6a25108b24507ed42d92

    • SHA1

      13a4bbad492664537a17eaca0ce8e1438ea61e73

    • SHA256

      76be449e67d2c68c75ff0312a50904140cde0a479968f0fe32192bb9a7e76782

    • SHA512

      5440d9f5393fa279c09683bb8d605322398427e915a863703e8768995b2827bb219591005b0ed8bdc6a8cdeca1d027a800bf4d341f9d59428b6a0c9e6e3392d6

    • SSDEEP

      768:xk/LjSNwrGBs80WEe9lyXR2k4kHgMVfM1gY4/UGZXTfOEmo3kP:xk/LjSNwrGBzFEZpgHt4JZXTfObo3k

    • Contacts a large (40110) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks