General

  • Target

    jklx86.elf

  • Size

    45KB

  • Sample

    221127-3v5wxadc3x

  • MD5

    185f72c0aa861061aa86ea273d685122

  • SHA1

    7e3c7aae1c978f7fc2e7bc513ef197d32b6a9efa

  • SHA256

    ad2028d6ffc177282cbbccc5f602b8279afdae6c7a13c3ce03e1d11572da2b8b

  • SHA512

    fd5c3c64d9d710330f873b95e1741fbd899c71e671940b71c0a6ef765b72cedb8379bbea8dbb1871617fe836786564a5f588203524c0e80f1cdcbbd20da7dff8

  • SSDEEP

    768:OjX7TGggtBONfCitU6/WxSBhLKJA9fBWIrqfJ+E7EjP3f3+UGsH:CX7TGggtBON75+xGowzqBIPPZGs

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      jklx86.elf

    • Size

      45KB

    • MD5

      185f72c0aa861061aa86ea273d685122

    • SHA1

      7e3c7aae1c978f7fc2e7bc513ef197d32b6a9efa

    • SHA256

      ad2028d6ffc177282cbbccc5f602b8279afdae6c7a13c3ce03e1d11572da2b8b

    • SHA512

      fd5c3c64d9d710330f873b95e1741fbd899c71e671940b71c0a6ef765b72cedb8379bbea8dbb1871617fe836786564a5f588203524c0e80f1cdcbbd20da7dff8

    • SSDEEP

      768:OjX7TGggtBONfCitU6/WxSBhLKJA9fBWIrqfJ+E7EjP3f3+UGsH:CX7TGggtBON75+xGowzqBIPPZGs

    Score
    9/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Tasks