Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    jklmpsl.elf

  • Size

    79KB

  • Sample

    250311-ak4lwatyg1

  • MD5

    9f79f159a672411a7e5b01f1ed3deb4a

  • SHA1

    98584c58a231322ed3e64b96727fe6d935f30aa4

  • SHA256

    9cf41e60807702cd85a42ffcabb10f2798193200a381b47f3adbebe65f8360aa

  • SHA512

    8486d8dbf427ba9e45b81ae462b64239e7aa33e55603ffa12b8cf7efc80e4b0300e6764fb1c89bc261f910178553b68adc6401fb7de1f6eb36a4f76b5b5b5537

  • SSDEEP

    1536:B5ehR3ufwZOh3NIU0ij5is7meOxYgzvxG44qJBgTfa8I29Kncj2UN9dWqIhXfWA9:HeVufwZOh3qY5is7meOxYgzvxG44qJBK

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      jklmpsl.elf

    • Size

      79KB

    • MD5

      9f79f159a672411a7e5b01f1ed3deb4a

    • SHA1

      98584c58a231322ed3e64b96727fe6d935f30aa4

    • SHA256

      9cf41e60807702cd85a42ffcabb10f2798193200a381b47f3adbebe65f8360aa

    • SHA512

      8486d8dbf427ba9e45b81ae462b64239e7aa33e55603ffa12b8cf7efc80e4b0300e6764fb1c89bc261f910178553b68adc6401fb7de1f6eb36a4f76b5b5b5537

    • SSDEEP

      1536:B5ehR3ufwZOh3NIU0ij5is7meOxYgzvxG44qJBgTfa8I29Kncj2UN9dWqIhXfWA9:HeVufwZOh3qY5is7meOxYgzvxG44qJBK

    • Contacts a large (82608) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks