General

  • Target

    jklx86.elf

  • Size

    49KB

  • Sample

    250307-pf4hmszvht

  • MD5

    ecd1b914d0248a8174d1f5ef567e2227

  • SHA1

    c5ba0731a7b3236db4b8443b6be4f2f07d5ed6e5

  • SHA256

    adc70485dbae6ab79f9083ff5f96da2fece8b5922f0f5d0757d1c366285bfab6

  • SHA512

    9e25c305fa81ce9c4f715d6bc746fae810bc255d7e3d10017242864c4c04923644e86fce42b16c0638a06eb44aa8abec2681d944670dd22d69ac4d0cebbe979f

  • SSDEEP

    1536:7uld7p12jkVJCWsAmSffC6tqacGSHfnHqs4ec:7uldP2jkV0BSfFiHfHq9/

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      jklx86.elf

    • Size

      49KB

    • MD5

      ecd1b914d0248a8174d1f5ef567e2227

    • SHA1

      c5ba0731a7b3236db4b8443b6be4f2f07d5ed6e5

    • SHA256

      adc70485dbae6ab79f9083ff5f96da2fece8b5922f0f5d0757d1c366285bfab6

    • SHA512

      9e25c305fa81ce9c4f715d6bc746fae810bc255d7e3d10017242864c4c04923644e86fce42b16c0638a06eb44aa8abec2681d944670dd22d69ac4d0cebbe979f

    • SSDEEP

      1536:7uld7p12jkVJCWsAmSffC6tqacGSHfnHqs4ec:7uldP2jkV0BSfFiHfHq9/

    • Contacts a large (179927) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks