MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled
Jump to navigation
Jump to search
(Publication) Google search: [1]
MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled | |
---|---|
Botnet | Mirai |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | IoT, Linux |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2016 / 2016-08-31 |
Editor/Conference | Malware Must Die |
Link | http://blog.malwaremustdie.org/2016/08/mmd-0056-2016-linuxmirai-just.html (Archive copy) |
Author | unixfreaxjp |
Type | Blogpost |
Abstract
“ From August 4th 2016 several sysadmin friends were helping us by uploading this malware files to our dropbox. The samples of this particular ELF malware ware not easy to retrieve, there are good ones and also some broken ones, I listed in this post for the good ones only. This threat is made by a new ELF trojan backdoor which is now in on-going stage aiming IoT, the name of the binary is "mirai.*" and is having telnet attack as main functionality to other boxes.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2016BFR4950, editor = {Malware Must Die}, author = {unixfreaxjp}, title = {MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled}, date = {31}, month = Aug, year = {2016}, howpublished = {\url{http://blog.malwaremustdie.org/2016/08/mmd-0056-2016-linuxmirai-just.html}}, }