General

  • Target

    arm.elf

  • Size

    62KB

  • Sample

    250201-zg3yls1ncl

  • MD5

    c2f5e37fcc5fc43075d85883e0eb11e7

  • SHA1

    4805a2a2e28ccdd41028c5d27bd8b0f39eba08e7

  • SHA256

    d819f82d931f9e5fcff275b88c7849d737595f75f34ba60d92d68d16e68b0ea4

  • SHA512

    ce79338637bdf78ad04dd93688a4f90b91933a04e1d583bf47a7bf33fe76df9b8a25f9b00d18161bfffbb9e96370214e477da8bfafdf96047bc39b8581d12c77

  • SSDEEP

    1536:uGCfRTFptQ3SSYTB/s/VqaC9JaBO1Jd2:uGCfRp9TxgmJd

Malware Config

Extracted

Family

mirai

C2

kurwa.barsoeb.space

Targets

    • Target

      arm.elf

    • Size

      62KB

    • MD5

      c2f5e37fcc5fc43075d85883e0eb11e7

    • SHA1

      4805a2a2e28ccdd41028c5d27bd8b0f39eba08e7

    • SHA256

      d819f82d931f9e5fcff275b88c7849d737595f75f34ba60d92d68d16e68b0ea4

    • SHA512

      ce79338637bdf78ad04dd93688a4f90b91933a04e1d583bf47a7bf33fe76df9b8a25f9b00d18161bfffbb9e96370214e477da8bfafdf96047bc39b8581d12c77

    • SSDEEP

      1536:uGCfRTFptQ3SSYTB/s/VqaC9JaBO1Jd2:uGCfRp9TxgmJd

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks