General

  • Target

    270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443.elf

  • Size

    55KB

  • Sample

    250307-d2alxaszgx

  • MD5

    6808c976ae3e0456efb6e6fc4e1a8423

  • SHA1

    d9b7a61a16aa0e2875b04ff7eac22e72fc15a24e

  • SHA256

    270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443

  • SHA512

    8b890a0f2d216b8041577412b2d7d4f9524caf0d185f45d48ce7df781fce05e0148e3f767dfc6bb76931a9237e6a26b80decae63a7685760727a8b9716855917

  • SSDEEP

    1536:llSu/lC0mny49rgfcya5F+tt5zTM4cPVSh:llSuEUraCtbvfcPVg

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443.elf

    • Size

      55KB

    • MD5

      6808c976ae3e0456efb6e6fc4e1a8423

    • SHA1

      d9b7a61a16aa0e2875b04ff7eac22e72fc15a24e

    • SHA256

      270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443

    • SHA512

      8b890a0f2d216b8041577412b2d7d4f9524caf0d185f45d48ce7df781fce05e0148e3f767dfc6bb76931a9237e6a26b80decae63a7685760727a8b9716855917

    • SSDEEP

      1536:llSu/lC0mny49rgfcya5F+tt5zTM4cPVSh:llSuEUraCtbvfcPVg

    • Contacts a large (162424) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks