General
-
Target
morte.mips.elf
-
Size
119KB
-
Sample
250706-f7r49a1vgy
-
MD5
e85c12cc5f30189acd55e052cd29ddd2
-
SHA1
5a8f1cc7148ff425aabd90841d3e24b0de575698
-
SHA256
fbcb989ddfedbb581ced2361e642e7bbe82a6c66b1374e66df042e2083056c46
-
SHA512
7ea2d2294074289ad6d8f8dbaaa1a8a953372187acb93f64e05b50e927cc9627cbf1e91b9ca48e11e9f3844264abbcaf006fb0558c8848aefabd8468da7e7748
-
SSDEEP
1536:5cLWP2C2Sf348tJUarjhwwC3+bYRB+JUjNZznRBsPenKRh4QN7y:cWP2e34QJUarw3+bYz+JUjDnXq42y
Behavioral task
behavioral1
Sample
morte.mips.elf
Resource
debian9-mipsbe-20250619-en
Malware Config
Extracted
mirai
cnc.jssaytcp.lat
Targets
-
-
Target
morte.mips.elf
-
Size
119KB
-
MD5
e85c12cc5f30189acd55e052cd29ddd2
-
SHA1
5a8f1cc7148ff425aabd90841d3e24b0de575698
-
SHA256
fbcb989ddfedbb581ced2361e642e7bbe82a6c66b1374e66df042e2083056c46
-
SHA512
7ea2d2294074289ad6d8f8dbaaa1a8a953372187acb93f64e05b50e927cc9627cbf1e91b9ca48e11e9f3844264abbcaf006fb0558c8848aefabd8468da7e7748
-
SSDEEP
1536:5cLWP2C2Sf348tJUarjhwwC3+bYRB+JUjNZznRBsPenKRh4QN7y:cWP2e34QJUarw3+bYz+JUjDnXq42y
-
Mirai family
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Write file to user bin folder
-
Writes file to system bin folder
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
2RC Scripts
2Privilege Escalation
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
2RC Scripts
2