General

  • Target

    6d81d8578400771b59850cba7f2b9dd4b0500c6d64023c2eca822686df61b660

  • Size

    2KB

  • Sample

    250403-m99kmsvyhy

  • MD5

    8898b85fcf2be0dbfb81a50e4197ebb5

  • SHA1

    839c6228dac4d87a1fee8475ff28ecdf37790ee5

  • SHA256

    6d81d8578400771b59850cba7f2b9dd4b0500c6d64023c2eca822686df61b660

  • SHA512

    2921220e07fc004165e82dd5f0e8240e12ece9447cbde272dcc3cc4cf7733b0b45bd85b039b0d52eadd45f40e87388a5e750b75159660281cd92e311f6327f60

Malware Config

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

Extracted

Family

mirai

Botnet

OWARI

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Extracted

Family

mirai

Botnet

OWARI

C2

newageofkifirempire.camdvr.org

Targets

    • Target

      6d81d8578400771b59850cba7f2b9dd4b0500c6d64023c2eca822686df61b660

    • Size

      2KB

    • MD5

      8898b85fcf2be0dbfb81a50e4197ebb5

    • SHA1

      839c6228dac4d87a1fee8475ff28ecdf37790ee5

    • SHA256

      6d81d8578400771b59850cba7f2b9dd4b0500c6d64023c2eca822686df61b660

    • SHA512

      2921220e07fc004165e82dd5f0e8240e12ece9447cbde272dcc3cc4cf7733b0b45bd85b039b0d52eadd45f40e87388a5e750b75159660281cd92e311f6327f60

    • Mirai

      Mirai is a prevalent Linux malware infecting exposed network devices.

    • Mirai family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks