General

  • Target

    9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9.elf

  • Size

    74KB

  • Sample

    250308-nz4gbawxb1

  • MD5

    531a60e53317c7bf134e5c6e57fc4939

  • SHA1

    6069b3cb94084ec8bfad12f20a7fc992835e329d

  • SHA256

    9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9

  • SHA512

    f19ca0527fb858aff4da9f864f1fad8433cc229b8ffabec4fd559a3af4a3fe3d71213a913067a6fea4314b75881ebbe5a8d24408cd8199a3ed54b15725c7505e

  • SSDEEP

    1536:lKBKC1576Ph/OUbdaQZdXdXmtlvfPKt6hO0r/:0Ic57yh/pPUvPZhOA/

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9.elf

    • Size

      74KB

    • MD5

      531a60e53317c7bf134e5c6e57fc4939

    • SHA1

      6069b3cb94084ec8bfad12f20a7fc992835e329d

    • SHA256

      9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9

    • SHA512

      f19ca0527fb858aff4da9f864f1fad8433cc229b8ffabec4fd559a3af4a3fe3d71213a913067a6fea4314b75881ebbe5a8d24408cd8199a3ed54b15725c7505e

    • SSDEEP

      1536:lKBKC1576Ph/OUbdaQZdXdXmtlvfPKt6hO0r/:0Ic57yh/pPUvPZhOA/

    • Contacts a large (143276) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks