MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled
Botnet Mirai
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target IoT, Linux
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2016 / 2016-08-31
Editor/Conference Malware Must Die
Link http://blog.malwaremustdie.org/2016/08/mmd-0056-2016-linuxmirai-just.html (Archive copy)
Author unixfreaxjp
Type Blogpost

Abstract

From August 4th 2016 several sysadmin friends were helping us by uploading this malware files to our dropbox. The samples of this particular ELF malware ware not easy to retrieve, there are good ones and also some broken ones, I listed in this post for the good ones only. This threat is made by a new ELF trojan backdoor which is now in on-going stage aiming IoT, the name of the binary is "mirai.*" and is having telnet attack as main functionality to other boxes.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2016BFR4950,
   editor = {Malware Must Die},
   author = {unixfreaxjp},
   title = {MMD-0056-2016 - Linux/Mirai, how an old ELF malcode is recycled},
   date = {31},
   month = Aug,
   year = {2016},
   howpublished = {\url{http://blog.malwaremustdie.org/2016/08/mmd-0056-2016-linuxmirai-just.html}},
 }