Author: Jemimah Mae Molina   

 

Trojan.Linux.Mirai.1 (BITDEFENDER); ELF/Mirai.AT!tr (FORTINET)

 PLATFORM:

Linux

 OVER ALL RISK RATING:
 DAMAGE POTENTIAL::
 DISTRIBUTION POTENTIAL::
 REPORTED INFECTION:
 INFORMATION EXPOSURE:
Low
Medium
High
Critical

  • Threat Type:
    Backdoor

  • Destructiveness:
    No

  • Encrypted:
    No

  • In the wild::
    Yes

  OVERVIEW

INFECTION CHANNEL: Eliminado por otro tipo de malware, Descargado de Internet

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Ejecuta comandos desde un usuario remoto malicioso que pone en peligro el sistema afectado. Se conecta a un sitio Web para enviar y recibir información.

  TECHNICAL DETAILS

File size: 70,960 bytes
File type: ELF
Memory resident: Yes
INITIAL SAMPLES RECEIVED DATE: 24 января 2020
PAYLOAD: Connects to URLs/IPs, Launches DoS/DDoS attacks

Detalles de entrada

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Rutina de puerta trasera

Ejecuta los comandos siguientes desde un usuario remoto malicioso:

  • Performs various DDOS attacks

Se conecta a los sitios Web siguientes para enviar y recibir información:

  • {BLOCKED}.{BLOCKED}.125.169:45

Otros detalles

Hace lo siguiente:

  • It uses the following credentials to try to login to other devices:
    • xc3511
    • root
    • xc3518
    • xc3515
    • 20150602
    • vstarcam2015
    • zte9x15
    • vertex25ektks123
    • te521
    • default
    • OxhlwS
    • antslq
    • guest
    • aquario
    • support
    • password
    • user
    • admin1234
    • 1111
    • 12345
    • ipcam_rt5350
    • ho4uku6at
    • kont2004
    • in1do
    • hunt5759
    • Oadmin123
    • 3ep5w2u
    • xmhdipc
    • klv123
    • 123456
    • jvbzd
    • ivdev
    • hi3518
    • cat1029
    • annie2012
    • annie2013
    • annie2014
    • annie2015
    • annie2016
    • 8182
    • vizxv
    • admin
    • linux
    • zlxx
    • calvin
    • fidel123
    • wpbo6
    • epicrouter
    • motorola
    • merlin
    • mg3500
  • It displays the following string once executed in the command line:
    • Connected To CNC
  • It may spread to other devices by taking advantage of the following vulnerabilities: