General

  • Target

    arm7.elf

  • Size

    140KB

  • Sample

    250323-dcr5na1ps2

  • MD5

    a4f6cf4e6edb03734e3fd5d250dfa63b

  • SHA1

    1297b2b89a27d8c3615548099cd38cbab48dc406

  • SHA256

    5cc8e494a701a2f510cff13ec26bc59ef4c8f0812685a1ff7752a1c613f52f31

  • SHA512

    5e1828b4cf29b04a553895af4299a46d83de01f59142737b1a66d121047404636d7c38b4052319fc6c5d5be100af82d7c9c54f4c41f5aa80bc3d423e70e8eb78

  • SSDEEP

    3072:KTg0ts0CbhXBazV4WLZIdiv9cBBXB45M/9t1Ng:WruVbZBazV4W9IYOBXBaM/9tE

Malware Config

Extracted

Family

mirai

Botnet

WICKED

Targets

    • Target

      arm7.elf

    • Size

      140KB

    • MD5

      a4f6cf4e6edb03734e3fd5d250dfa63b

    • SHA1

      1297b2b89a27d8c3615548099cd38cbab48dc406

    • SHA256

      5cc8e494a701a2f510cff13ec26bc59ef4c8f0812685a1ff7752a1c613f52f31

    • SHA512

      5e1828b4cf29b04a553895af4299a46d83de01f59142737b1a66d121047404636d7c38b4052319fc6c5d5be100af82d7c9c54f4c41f5aa80bc3d423e70e8eb78

    • SSDEEP

      3072:KTg0ts0CbhXBazV4WLZIdiv9cBBXB45M/9t1Ng:WruVbZBazV4W9IYOBXBaM/9tE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks