General

  • Target

    fc96aa360ca3f3318444f338f9131a9a43c00beb3e812e639cfe80f07219c9a7.elf

  • Size

    55KB

  • Sample

    250307-kdmd5aw1a1

  • MD5

    a2e0300a38d49740dd9af7820f2e2b6b

  • SHA1

    82fc641a38383412bb88dd5cdb83d45a8315daa5

  • SHA256

    fc96aa360ca3f3318444f338f9131a9a43c00beb3e812e639cfe80f07219c9a7

  • SHA512

    cc4906d1088a9191ade954aa1637ade08e6e7278bb4b541a0af0549bb876b3adcb7ba5cc94acf3e455d1e65e5f6afce36b1556129b95a53392aae72112f3bfa6

  • SSDEEP

    1536:ndtYhIj0OEmEAMQSyya5FAt5NTi4eJV8+z:ndtYhINOJaMb1NeJV9z

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      fc96aa360ca3f3318444f338f9131a9a43c00beb3e812e639cfe80f07219c9a7.elf

    • Size

      55KB

    • MD5

      a2e0300a38d49740dd9af7820f2e2b6b

    • SHA1

      82fc641a38383412bb88dd5cdb83d45a8315daa5

    • SHA256

      fc96aa360ca3f3318444f338f9131a9a43c00beb3e812e639cfe80f07219c9a7

    • SHA512

      cc4906d1088a9191ade954aa1637ade08e6e7278bb4b541a0af0549bb876b3adcb7ba5cc94acf3e455d1e65e5f6afce36b1556129b95a53392aae72112f3bfa6

    • SSDEEP

      1536:ndtYhIj0OEmEAMQSyya5FAt5NTi4eJV8+z:ndtYhINOJaMb1NeJV9z

    • Contacts a large (186141) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks