General

  • Target

    c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257.elf

  • Size

    49KB

  • Sample

    250307-hxv49swqt8

  • MD5

    eea027cd04972ccf570c9186dda2f572

  • SHA1

    6649dbed7d534f52a93d5b72fa3bc580707710d9

  • SHA256

    c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257

  • SHA512

    0a2627b9307610ea2419ff0ddd01c93f62878b815b57381c211dae75f95bd85fad6e0ef0ee552ea4d09dc81c62aeab2e5beea6ab8d80c3e1719dc601cedb0cb2

  • SSDEEP

    1536:7uld7p12jkVJCWsAmSfFkCFk9m86+H/nHqY4ec:7uldP2jkV0BSfnyH/Hqh/

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257.elf

    • Size

      49KB

    • MD5

      eea027cd04972ccf570c9186dda2f572

    • SHA1

      6649dbed7d534f52a93d5b72fa3bc580707710d9

    • SHA256

      c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257

    • SHA512

      0a2627b9307610ea2419ff0ddd01c93f62878b815b57381c211dae75f95bd85fad6e0ef0ee552ea4d09dc81c62aeab2e5beea6ab8d80c3e1719dc601cedb0cb2

    • SSDEEP

      1536:7uld7p12jkVJCWsAmSfFkCFk9m86+H/nHqY4ec:7uldP2jkV0BSfnyH/Hqh/

    • Contacts a large (66574) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks