General

  • Target

    c46bf457d9e1aa52b5349f3e0b9b5195.bin

  • Size

    31KB

  • Sample

    250413-b1jgbawvfx

  • MD5

    fd10f9258338dd35278c0a64637b5f75

  • SHA1

    48951be8a2eb54dac9344927f9c7fb505f100d2f

  • SHA256

    d925269ce721d836ae0060c2589ee12a5327039a1488f9ca343877f97c7cf66d

  • SHA512

    f3af41b1a663ced5afedad11a2327859dc5e6dceb52d14f15db4ad595fd9deeb6186c7e033d3b2fe9b9b5d7a11f3aa291d1fa85357adef366ba1279e6ba6c99c

  • SSDEEP

    768:YPmTaTAX5pMa3d56cgIBbdsOY+09uPSqcbggrByQaPZ:uCpMaN5vYluP9uRaPZ

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      2fdb0c9806fcf3a946a4b1194632f51feb72c33b911706c41c445b742dd394c1.elf

    • Size

      59KB

    • MD5

      c46bf457d9e1aa52b5349f3e0b9b5195

    • SHA1

      d3d259d229917928b470dd5dee0fb544d2e50ba4

    • SHA256

      2fdb0c9806fcf3a946a4b1194632f51feb72c33b911706c41c445b742dd394c1

    • SHA512

      d66f447b9d97417bfe50d8cdfad4da0a0d61381e8e183ce67b5e6b1c86bfddbad0dfef70f68059b671306de1b445736bb02b48b33d0e7637f3a7ff78a0708bbb

    • SSDEEP

      1536:2RuaDprw8bDK/eUi8w7tUXyFgyocput5+qlx2PHB:2RuMO8/Lq4gc4b+qlx2h

    • Contacts a large (19782) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v16

Tasks