General

  • Target

    arm4.elf

  • Size

    56KB

  • Sample

    250215-q1e68asmat

  • MD5

    1dc37c35ce461fc75dc4ba90eb1c4cec

  • SHA1

    42fda6bf16cd201ad1b10d31680f021605d32de9

  • SHA256

    ab397f1e5fdf38006613234f6d9fc1fdbb9abdf5bd591c2f19f9f4214fe251ad

  • SHA512

    cb6ebd5994e2239670489493e1b3e11851bf9c60b22cd521f3c647b6c9c76d24289fb0444520da0aa2a4b369377bae276639a0909ee45878fce660ec6a04e519

  • SSDEEP

    1536:0krMPCKjMNIMDf/DKK78SBEcz83Jy5wdambeaY:0koK2pyEcoZyudambeaY

Malware Config

Extracted

Family

mirai

Botnet

KURC

Targets

    • Target

      arm4.elf

    • Size

      56KB

    • MD5

      1dc37c35ce461fc75dc4ba90eb1c4cec

    • SHA1

      42fda6bf16cd201ad1b10d31680f021605d32de9

    • SHA256

      ab397f1e5fdf38006613234f6d9fc1fdbb9abdf5bd591c2f19f9f4214fe251ad

    • SHA512

      cb6ebd5994e2239670489493e1b3e11851bf9c60b22cd521f3c647b6c9c76d24289fb0444520da0aa2a4b369377bae276639a0909ee45878fce660ec6a04e519

    • SSDEEP

      1536:0krMPCKjMNIMDf/DKK78SBEcz83Jy5wdambeaY:0koK2pyEcoZyudambeaY

    • Contacts a large (23199) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks