General

  • Target

    df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d.elf

  • Size

    34KB

  • Sample

    250307-jkt7waxks9

  • MD5

    e78b38a38e9d29e65c62d69fab9c21d6

  • SHA1

    24e806a34d68ded244ed6a126788d628bafea484

  • SHA256

    df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d

  • SHA512

    2f3813b83f1c91dc134469aabaf977e2eb263fb2d1024d61838a96fc54d0e65998d44035b8d266b6d83e6e7a9555c60fa9533c756155a83d656aef6b1443dd2b

  • SSDEEP

    768:3K+WG4fB+Huvbh7W3SC1UhFquNbfkopyP:3KC4BlsUCuFsopY

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d.elf

    • Size

      34KB

    • MD5

      e78b38a38e9d29e65c62d69fab9c21d6

    • SHA1

      24e806a34d68ded244ed6a126788d628bafea484

    • SHA256

      df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d

    • SHA512

      2f3813b83f1c91dc134469aabaf977e2eb263fb2d1024d61838a96fc54d0e65998d44035b8d266b6d83e6e7a9555c60fa9533c756155a83d656aef6b1443dd2b

    • SSDEEP

      768:3K+WG4fB+Huvbh7W3SC1UhFquNbfkopyP:3KC4BlsUCuFsopY

    • Contacts a large (14701) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks