General

  • Target

    a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d.elf

  • Size

    50KB

  • Sample

    250307-gey8jawkt2

  • MD5

    3c408fb97d7c344322e2390513cdaae1

  • SHA1

    b2489131e0044748ee2f8c577163cc1af639137f

  • SHA256

    a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d

  • SHA512

    693462d4aa4eaebd8f623b3518dc8f89a0ee1add46d7fdf71f98814874d8e85116e3f5dcaceab01041d0d5f04efab2ffd0d0f3b159e2fbdc7e42ec1832406326

  • SSDEEP

    768:DMnolJlR+K9COmVBjECJNJvOn3vej77ogZuh8rom/h14BGINsJSknK4Lg:uolTsYCJ3mnfe3Vuh8sm5OEfrF

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d.elf

    • Size

      50KB

    • MD5

      3c408fb97d7c344322e2390513cdaae1

    • SHA1

      b2489131e0044748ee2f8c577163cc1af639137f

    • SHA256

      a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d

    • SHA512

      693462d4aa4eaebd8f623b3518dc8f89a0ee1add46d7fdf71f98814874d8e85116e3f5dcaceab01041d0d5f04efab2ffd0d0f3b159e2fbdc7e42ec1832406326

    • SSDEEP

      768:DMnolJlR+K9COmVBjECJNJvOn3vej77ogZuh8rom/h14BGINsJSknK4Lg:uolTsYCJ3mnfe3Vuh8sm5OEfrF

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks