General

  • Target

    nklarm7.elf

  • Size

    73KB

  • Sample

    250310-b4rbbsyscw

  • MD5

    862793c87c5bc7664ee11d9ef2122a51

  • SHA1

    1640fe8b76cb1d116aefa393ff64a532561d497a

  • SHA256

    fd3d0b264db42129b267ec3b01a2f2a5414668ea82a17b47d621b15bc9282011

  • SHA512

    ec7d0a59cc84412370dd952c74f56cbec786037ca36faae9d0cad60637b1943f7a18c51ffc51acc25581883fe67f127513bd509c83fbff2341bf545fb5f06f00

  • SSDEEP

    1536:Npngq7mByGw9K09oABAKgddL/4/eLJX9woDVoK/M9J9lcki/H+ArX:EomBC9KABA9d+/eLR9woDVoK/fxH+u

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      nklarm7.elf

    • Size

      73KB

    • MD5

      862793c87c5bc7664ee11d9ef2122a51

    • SHA1

      1640fe8b76cb1d116aefa393ff64a532561d497a

    • SHA256

      fd3d0b264db42129b267ec3b01a2f2a5414668ea82a17b47d621b15bc9282011

    • SHA512

      ec7d0a59cc84412370dd952c74f56cbec786037ca36faae9d0cad60637b1943f7a18c51ffc51acc25581883fe67f127513bd509c83fbff2341bf545fb5f06f00

    • SSDEEP

      1536:Npngq7mByGw9K09oABAKgddL/4/eLJX9woDVoK/M9J9lcki/H+ArX:EomBC9KABA9d+/eLR9woDVoK/fxH+u

    • Contacts a large (163677) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks