General

  • Target

    Hilix.mpsl.elf

  • Size

    78KB

  • Sample

    250216-x3e3kawmdn

  • MD5

    2b9e19987cb1a7cdcc422708ff5ded31

  • SHA1

    8b4c8374f2e0cb8b9551096464c92cf125720788

  • SHA256

    6b708c04f7bfa45d586b4466fa0bc29b95c5f793ed610adcbc67fb1f9526dbe6

  • SHA512

    8759c14e95e970f57856c3be6a517cf00c344ed08833b7200ab96b44968716d63b4393e8b3bfe77278705f74a0a2f00be1629837e1a28550b668fb1a2e90fff6

  • SSDEEP

    1536:aqJw3YsMggETUfX9bBSsZjZbjZXxhaGAjTSD:aqJesZETUPBbjrD

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      Hilix.mpsl.elf

    • Size

      78KB

    • MD5

      2b9e19987cb1a7cdcc422708ff5ded31

    • SHA1

      8b4c8374f2e0cb8b9551096464c92cf125720788

    • SHA256

      6b708c04f7bfa45d586b4466fa0bc29b95c5f793ed610adcbc67fb1f9526dbe6

    • SHA512

      8759c14e95e970f57856c3be6a517cf00c344ed08833b7200ab96b44968716d63b4393e8b3bfe77278705f74a0a2f00be1629837e1a28550b668fb1a2e90fff6

    • SSDEEP

      1536:aqJw3YsMggETUfX9bBSsZjZbjZXxhaGAjTSD:aqJesZETUPBbjrD

    • Contacts a large (134230) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks