General

  • Target

    arm5.b.elf

  • Size

    120KB

  • Sample

    250202-v4er3ssjbw

  • MD5

    0261bae15d2f212d7bb7904d12c562ac

  • SHA1

    ceae8d6b6d4804be1e99e6812d7dba212ebb6621

  • SHA256

    95632ccf7531e0cd4e3e35e9ee63726a16b06ebc7808434324f5cef6f9ddbfaf

  • SHA512

    37d03120cbfc06a5a70e024c1682ecfcee2ed5d1c118b29b29a04d30eb318ef4f85ece63b16c81e0d31416414bbc7b287dc73aab91c12f395918d610f06b4240

  • SSDEEP

    1536:+SntBSk+8hwl3nlBSDx1PayWs+9xCk9lDyiuyy9kzYzMr0vo3o4y7lY+h7W+hA:T0gylyx1PayWs+9tCyy9+YzMIXV7qYG

Malware Config

Extracted

Family

mirai

Botnet

AMEN

Targets

    • Target

      arm5.b.elf

    • Size

      120KB

    • MD5

      0261bae15d2f212d7bb7904d12c562ac

    • SHA1

      ceae8d6b6d4804be1e99e6812d7dba212ebb6621

    • SHA256

      95632ccf7531e0cd4e3e35e9ee63726a16b06ebc7808434324f5cef6f9ddbfaf

    • SHA512

      37d03120cbfc06a5a70e024c1682ecfcee2ed5d1c118b29b29a04d30eb318ef4f85ece63b16c81e0d31416414bbc7b287dc73aab91c12f395918d610f06b4240

    • SSDEEP

      1536:+SntBSk+8hwl3nlBSDx1PayWs+9xCk9lDyiuyy9kzYzMr0vo3o4y7lY+h7W+hA:T0gylyx1PayWs+9tCyy9+YzMIXV7qYG

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Traces itself

      Traces itself to prevent debugging attempts

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks