General

  • Target

    mirai.mips.elf

  • Size

    77KB

  • Sample

    250411-xjnwcsxway

  • MD5

    5e00919715880970cba91795d7078453

  • SHA1

    b5ad4293488c439004670801555677bde3368220

  • SHA256

    707c76833704af2127fbbd2ababe61c417340b3fe8c12cedd8caa2122afecc29

  • SHA512

    2d5b388de442999b22c76b02b3b4b3448dfa53a6348f2d557f5761c9e02b81194c7a7ff668da4a560febe0f5fcd2ceaac40181259eae0b79b2dbfab03e3f4934

  • SSDEEP

    1536:DM8dlkyCuyPlr51SUJCGy99wOYf8Pzqaa4enN4a:w+5CuyP5GUJCGK9zqaa4enOa

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      mirai.mips.elf

    • Size

      77KB

    • MD5

      5e00919715880970cba91795d7078453

    • SHA1

      b5ad4293488c439004670801555677bde3368220

    • SHA256

      707c76833704af2127fbbd2ababe61c417340b3fe8c12cedd8caa2122afecc29

    • SHA512

      2d5b388de442999b22c76b02b3b4b3448dfa53a6348f2d557f5761c9e02b81194c7a7ff668da4a560febe0f5fcd2ceaac40181259eae0b79b2dbfab03e3f4934

    • SSDEEP

      1536:DM8dlkyCuyPlr51SUJCGy99wOYf8Pzqaa4enN4a:w+5CuyP5GUJCGK9zqaa4enOa

    • Contacts a large (23674) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v16

Tasks