Analysis

  • max time network
    152s
  • platform
    linux_mips
  • resource
    debian9-mipsbe-en-20211208
  • submitted
    25-04-2022 23:34

General

  • Target

    Mozi.mvcslipkq

  • Size

    106KB

  • MD5

    4dde761681684d7edad4e5e1ffdb940b

  • SHA1

    2327be693bc11a618c380d7d3abc2382d870d48b

  • SHA256

    d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8

  • SHA512

    91a61c719128f263f9f95736d55895954cc468c74ff469ee061d35ec382c50b9165e9a5427dc46a835dac6ae0e6e1f9819632475f68b98a907b53196bd4eb02a

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

    suricata: ET MALWARE JAWS Webserver Unauthenticated Shell Command Execution

  • suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

    suricata: ET MALWARE Mirai Variant User-Agent (Outbound)

  • suricata: ET MALWARE Mozi Botnet DHT Config Sent

    suricata: ET MALWARE Mozi Botnet DHT Config Sent

  • Contacts a large (3362) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

Processes

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads