General

  • Target

    arm.elf

  • Size

    91KB

  • Sample

    250310-m47tvssk17

  • MD5

    e82d2be7cc3bf861baada6f948ad2248

  • SHA1

    d943ce40929436ca65b41f92a8a017c1e65a3dd8

  • SHA256

    350fc7822ae13ed0400588bbfacc725f01701ebd8e6a48be34517421b18ce0aa

  • SHA512

    24aff91359aa84797008cc0b9037c3c4b6710df87ed4aec0671d9954a4664618da8fd2e0d9d29592cb9eafd2fb54c1873ad8026fba812621e72784b551ffda4c

  • SSDEEP

    1536:fiutfr0D0xoArDPi44bNf1XbVe+nCZoKeZW155Vxgrl3fWCIAvgQ4:fiafZIZCZLwYjnghukgQ4

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      arm.elf

    • Size

      91KB

    • MD5

      e82d2be7cc3bf861baada6f948ad2248

    • SHA1

      d943ce40929436ca65b41f92a8a017c1e65a3dd8

    • SHA256

      350fc7822ae13ed0400588bbfacc725f01701ebd8e6a48be34517421b18ce0aa

    • SHA512

      24aff91359aa84797008cc0b9037c3c4b6710df87ed4aec0671d9954a4664618da8fd2e0d9d29592cb9eafd2fb54c1873ad8026fba812621e72784b551ffda4c

    • SSDEEP

      1536:fiutfr0D0xoArDPi44bNf1XbVe+nCZoKeZW155Vxgrl3fWCIAvgQ4:fiafZIZCZLwYjnghukgQ4

    • Contacts a large (49304) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks