General

  • Target

    73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331.elf

  • Size

    73KB

  • Sample

    250307-fqwfcat1ct

  • MD5

    be093382b89ca448e81b889490d55070

  • SHA1

    516a3e310ccd3bba8e7d8220717f3e2721303df0

  • SHA256

    73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331

  • SHA512

    f65d7b13839c5cf6dfc24cc0df3d8d583bcda82eb79462e919ba995f39590f2d3983875c9326d81c65e60e57de7440deed6d810df6b266b80d68953ef3c71a2f

  • SSDEEP

    1536:NRnZzxaSMIArEY7Zb08Pat44ZlC8Zh5vR9KWj949lZEin/6QaQI3:Rx9MaY7Zo894ZlC8Zh5vR9KWWV6Q/

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331.elf

    • Size

      73KB

    • MD5

      be093382b89ca448e81b889490d55070

    • SHA1

      516a3e310ccd3bba8e7d8220717f3e2721303df0

    • SHA256

      73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331

    • SHA512

      f65d7b13839c5cf6dfc24cc0df3d8d583bcda82eb79462e919ba995f39590f2d3983875c9326d81c65e60e57de7440deed6d810df6b266b80d68953ef3c71a2f

    • SSDEEP

      1536:NRnZzxaSMIArEY7Zb08Pat44ZlC8Zh5vR9KWj949lZEin/6QaQI3:Rx9MaY7Zo894ZlC8Zh5vR9KWWV6Q/

    • Contacts a large (166185) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks