General

  • Target

    arm7.elf

  • Size

    169KB

  • Sample

    250309-xe9bhaxrw5

  • MD5

    4cfb2e468ca26714f9245f8560199a16

  • SHA1

    a2d9124d37cb49623e72eba5bef5e64163ecfb05

  • SHA256

    71c530dec9d8b7ce19c08057d38821ab6e0c807d8456206434254d61c7610b24

  • SHA512

    33b17a365f04a04b563b568001ab82951800f717e38deba885f8f30a550e0d0c2bafd1678f0c04360ab4feab0056fb259ba9d4aafd64d74de47f4ef9466afc42

  • SSDEEP

    3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKQ85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN95+Lh

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      arm7.elf

    • Size

      169KB

    • MD5

      4cfb2e468ca26714f9245f8560199a16

    • SHA1

      a2d9124d37cb49623e72eba5bef5e64163ecfb05

    • SHA256

      71c530dec9d8b7ce19c08057d38821ab6e0c807d8456206434254d61c7610b24

    • SHA512

      33b17a365f04a04b563b568001ab82951800f717e38deba885f8f30a550e0d0c2bafd1678f0c04360ab4feab0056fb259ba9d4aafd64d74de47f4ef9466afc42

    • SSDEEP

      3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKQ85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN95+Lh

    • Contacts a large (47587) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks