General

  • Target

    ad3e693187cf1790669232d0f5b685a9936b54df395a5007a3f2d5e0d2deab35

  • Size

    76KB

  • Sample

    221128-ex8tksac7t

  • MD5

    b52943c7038c3337059165d0d3a2779e

  • SHA1

    f1c53a3f3226a143037c6f07cbefa7f28901cee3

  • SHA256

    ad3e693187cf1790669232d0f5b685a9936b54df395a5007a3f2d5e0d2deab35

  • SHA512

    dd01dc91eeec789cd93cdaa1249e8dcf932957e26e4eb1ce848ac2a4d2973301e6da5303ea32ebd6428d7fbf37b478fc7955accb85ce906f769a319698e8afc7

  • SSDEEP

    1536:bZ7SJBzjpN+xbyUCvw0YN55nMo7iHRalx3rnduGUymkTiVHe7wDtaAYFLA:l7SJBzjpN+xbyUEM51kR0nduG5TiBeEm

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      ad3e693187cf1790669232d0f5b685a9936b54df395a5007a3f2d5e0d2deab35

    • Size

      76KB

    • MD5

      b52943c7038c3337059165d0d3a2779e

    • SHA1

      f1c53a3f3226a143037c6f07cbefa7f28901cee3

    • SHA256

      ad3e693187cf1790669232d0f5b685a9936b54df395a5007a3f2d5e0d2deab35

    • SHA512

      dd01dc91eeec789cd93cdaa1249e8dcf932957e26e4eb1ce848ac2a4d2973301e6da5303ea32ebd6428d7fbf37b478fc7955accb85ce906f769a319698e8afc7

    • SSDEEP

      1536:bZ7SJBzjpN+xbyUCvw0YN55nMo7iHRalx3rnduGUymkTiVHe7wDtaAYFLA:l7SJBzjpN+xbyUEM51kR0nduG5TiBeEm

    Score
    6/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Tasks