General

  • Target

    x86

  • Size

    56KB

  • Sample

    250324-pktt1atks3

  • MD5

    a7b4473399ce74c911ec86fe9f3a2295

  • SHA1

    16ceb93a19944b099d8da7c0f42faa92954fd8e7

  • SHA256

    5064463e3dcdc501a0cd479dcb09b24bd3bd0bf7cbacac0341f09c85f7dce81e

  • SHA512

    32031eae5f5e33a5c5c3c2f97d69675e54ddc3b74f85016418d543ff2a806cf92f77ca5b5c1085e5691544ced62c1b05e4d56da01d62d0e07b5555d40d151125

  • SSDEEP

    1536:l5nPRgxBusO4h25GTF005Ir45jol2DR08+OSo:qkBw25GL24+UR+Y

Malware Config

Extracted

Family

mirai

Botnet

WICKED

Targets

    • Target

      x86

    • Size

      56KB

    • MD5

      a7b4473399ce74c911ec86fe9f3a2295

    • SHA1

      16ceb93a19944b099d8da7c0f42faa92954fd8e7

    • SHA256

      5064463e3dcdc501a0cd479dcb09b24bd3bd0bf7cbacac0341f09c85f7dce81e

    • SHA512

      32031eae5f5e33a5c5c3c2f97d69675e54ddc3b74f85016418d543ff2a806cf92f77ca5b5c1085e5691544ced62c1b05e4d56da01d62d0e07b5555d40d151125

    • SSDEEP

      1536:l5nPRgxBusO4h25GTF005Ir45jol2DR08+OSo:qkBw25GL24+UR+Y

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks