General

  • Target

    zerarm7.elf

  • Size

    73KB

  • Sample

    250310-akc4xswtcs

  • MD5

    b03d3fdd1b0541d70bf20333bc29d6da

  • SHA1

    3524cacc0f59f1764e28279e4e65ac94c63b9281

  • SHA256

    a1d4783a0f02214fea4f9554f62dd48a055a8578ed7084d9486989e8d2d807cd

  • SHA512

    e09fdcb7e943b7deceb815334b739d11c7c60a460b5a67e24628a8092ee7ddc5327eeff1988dab39e0bb812d6e56df39f8defa0f0fabe958f048c6fc428c17b4

  • SSDEEP

    1536:/RnShVB6RcsK06pvJiYgP/rhYm1lekVuTjCdzISjM9U9lEUiqhnFsHV:oVBhsmvJirP9HjxVuTjCdzISjwohnFu

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      zerarm7.elf

    • Size

      73KB

    • MD5

      b03d3fdd1b0541d70bf20333bc29d6da

    • SHA1

      3524cacc0f59f1764e28279e4e65ac94c63b9281

    • SHA256

      a1d4783a0f02214fea4f9554f62dd48a055a8578ed7084d9486989e8d2d807cd

    • SHA512

      e09fdcb7e943b7deceb815334b739d11c7c60a460b5a67e24628a8092ee7ddc5327eeff1988dab39e0bb812d6e56df39f8defa0f0fabe958f048c6fc428c17b4

    • SSDEEP

      1536:/RnShVB6RcsK06pvJiYgP/rhYm1lekVuTjCdzISjM9U9lEUiqhnFsHV:oVBhsmvJirP9HjxVuTjCdzISjwohnFu

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks