General

  • Target

    zerx86.elf

  • Size

    44KB

  • Sample

    250201-qzvwaavjdz

  • MD5

    de6d87dcc7cca94ab81cd58afaf293f9

  • SHA1

    cf5307f8c7a5877a4f8c72097c99c409ac5e9e7d

  • SHA256

    c2c4cc78169a4f43a6b7d1921e6e9a8360e385b6f5d6067a9cfa7cd39d23f58d

  • SHA512

    2b603e253fadcba87d3201adc765e0c45bce2b2199a8ee25aeb13334dc021a37c134b4f43f3e476e0f9fa9de3488beb201606b6500a0e7f1f2291f10a08e73c6

  • SSDEEP

    768:gJlFG0NFOL9uzUroWWRCzPuj8C4zqx0gxuM8vhlnNv8mJ:gJlFG0NFOL9uzMJWRCzPYeO7xUvhlNvz

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      zerx86.elf

    • Size

      44KB

    • MD5

      de6d87dcc7cca94ab81cd58afaf293f9

    • SHA1

      cf5307f8c7a5877a4f8c72097c99c409ac5e9e7d

    • SHA256

      c2c4cc78169a4f43a6b7d1921e6e9a8360e385b6f5d6067a9cfa7cd39d23f58d

    • SHA512

      2b603e253fadcba87d3201adc765e0c45bce2b2199a8ee25aeb13334dc021a37c134b4f43f3e476e0f9fa9de3488beb201606b6500a0e7f1f2291f10a08e73c6

    • SSDEEP

      768:gJlFG0NFOL9uzUroWWRCzPuj8C4zqx0gxuM8vhlnNv8mJ:gJlFG0NFOL9uzMJWRCzPYeO7xUvhlNvz

    Score
    7/10
    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks