General

  • Target

    jew.mips.elf

  • Size

    83KB

  • Sample

    240701-z3wrestfnk

  • MD5

    d5d4d70a0f3ada7d855813869a1d4c20

  • SHA1

    205327d68a8aa1fe871edd8b414f743df9c6de0a

  • SHA256

    1697a8f026a43139d4fdcfe6d38146354d96b2fa7c969fda970adebf2be581a6

  • SHA512

    dcfe6433db50f08f3df147d3c748ed7cb2fd17548d79eb9d9209d9eb2926c853cebcb5a46766a10746ea16aa5bb27001bac2f182c9c6ecac04057e502dbe1f7e

  • SSDEEP

    1536:NUQAWCADOvthOX0YBncWjcWBDnnv4BdPeX7Ss8vNkQJEltRSOzE6dV0q2dLSvP5k:NUQAWCADOlh20YBncWjcWB7nQBw7SsY5

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

KURC

Targets

    • Target

      jew.mips.elf

    • Size

      83KB

    • MD5

      d5d4d70a0f3ada7d855813869a1d4c20

    • SHA1

      205327d68a8aa1fe871edd8b414f743df9c6de0a

    • SHA256

      1697a8f026a43139d4fdcfe6d38146354d96b2fa7c969fda970adebf2be581a6

    • SHA512

      dcfe6433db50f08f3df147d3c748ed7cb2fd17548d79eb9d9209d9eb2926c853cebcb5a46766a10746ea16aa5bb27001bac2f182c9c6ecac04057e502dbe1f7e

    • SSDEEP

      1536:NUQAWCADOvthOX0YBncWjcWBDnnv4BdPeX7Ss8vNkQJEltRSOzE6dV0q2dLSvP5k:NUQAWCADOlh20YBncWjcWB7nQBw7SsY5

    Score
    9/10
    • Contacts a large (55141) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Impair Defenses

1
T1562

Hijack Execution Flow

1
T1574

Discovery

Network Service Discovery

2
T1046

Tasks