General

  • Target

    ea2acd44174bf878b3ea7340599e5ec7.bin

  • Size

    31KB

  • Sample

    250413-b8fqdswxbv

  • MD5

    1f6db7e4c1943f30307746861dce48a3

  • SHA1

    53e78501fecd42225a478ba895f58cb5cf33393f

  • SHA256

    f49a79f48f3dcaca5bb92e3e914c3928a4bf358304754326b1c651bcde264631

  • SHA512

    7f01c9434a372eb8f93aa21064a9177f7a518e29d3ee84f897c9952f1ae333410bab7179f612475ff4496a8a9be4f7b5ed6065cf7447efa7638704c5e4a999db

  • SSDEEP

    768:nF2+Zxl22PFydRm+dNeiNdweqDVWfzyfLk/:nF2mxl22PMdRmPiNdweqy2zk/

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      3e57c18d02b60bcabf7c533668c9515396d86874464d609f230d28635fa7fcba.elf

    • Size

      78KB

    • MD5

      ea2acd44174bf878b3ea7340599e5ec7

    • SHA1

      d01f2ae0b6332b4e1de6c70fd343184569e42cab

    • SHA256

      3e57c18d02b60bcabf7c533668c9515396d86874464d609f230d28635fa7fcba

    • SHA512

      da919e091b72e6fe17fb269029ef4707926446f1287eb9f21c323721c5708cfd35fd1b66c3d0c7d6ac809e47d0a55fd13335b2bda1367250baf3d216a90dadcc

    • SSDEEP

      1536:8Vu0vLwRoSXtGRm1FoR62xk3MDuPS8pyIzBTa:8c0vLwR5ttoR62xMyIa

    • Contacts a large (7589) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Deletes itself

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v16

Tasks