General

  • Target

    zerx86.elf

  • Size

    45KB

  • Sample

    250310-cf6lsaypv2

  • MD5

    c17843bdb7476299eaf606d81b7388c8

  • SHA1

    85d0bc55f005963f79ff74cf1c165526f4c14f21

  • SHA256

    54b6884ce916a7fb61d580246410112f100e40fd4a799cafe7de0e1f26c293c6

  • SHA512

    2e3b6547cc07912aaec377b07e5dcd5bc60caeb11b5027c229cc80a295e7d163cb5ca261a5b6a9132d55196fbec104b457b2803c0270f6b515acd930579b6ce2

  • SSDEEP

    768:qK9Q8sbsAUkwsUnUZx0+xBrx0NrVk/0aW5Ag+yGQZz6PPjzrKw/YJt31Dxe0/F:L9Q8sbsAUkwsUnCx0+xBrx0Fy875Ag+W

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      zerx86.elf

    • Size

      45KB

    • MD5

      c17843bdb7476299eaf606d81b7388c8

    • SHA1

      85d0bc55f005963f79ff74cf1c165526f4c14f21

    • SHA256

      54b6884ce916a7fb61d580246410112f100e40fd4a799cafe7de0e1f26c293c6

    • SHA512

      2e3b6547cc07912aaec377b07e5dcd5bc60caeb11b5027c229cc80a295e7d163cb5ca261a5b6a9132d55196fbec104b457b2803c0270f6b515acd930579b6ce2

    • SSDEEP

      768:qK9Q8sbsAUkwsUnUZx0+xBrx0NrVk/0aW5Ag+yGQZz6PPjzrKw/YJt31Dxe0/F:L9Q8sbsAUkwsUnCx0+xBrx0Fy875Ag+W

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks