General

  • Target

    445b9f54a036a882f319f1e826851370.elf

  • Size

    65KB

  • Sample

    230203-lg25esdg62

  • MD5

    445b9f54a036a882f319f1e826851370

  • SHA1

    7ef69ad7281467de3cdb2bafd147267a8af5b1f3

  • SHA256

    6d9dbf90a0726fb7278aedc0b607edbbc9226ec675c3d6548d14b97c515a75c7

  • SHA512

    1ae4277e7da4f1bcd72ef7fc99b27690dbf1439eb9eca3c357c97f5ad2e6cceb3c7f87918658c3e2933e254b477b86814446318e32ef49f9f12c94529bc4ed08

  • SSDEEP

    1536:64brI6HqE6rUGJQ+zL93CDxutD7tu5XGXmdyIPM:lbk8qE6rUGi+V3CDYtDsoWXM

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      445b9f54a036a882f319f1e826851370.elf

    • Size

      65KB

    • MD5

      445b9f54a036a882f319f1e826851370

    • SHA1

      7ef69ad7281467de3cdb2bafd147267a8af5b1f3

    • SHA256

      6d9dbf90a0726fb7278aedc0b607edbbc9226ec675c3d6548d14b97c515a75c7

    • SHA512

      1ae4277e7da4f1bcd72ef7fc99b27690dbf1439eb9eca3c357c97f5ad2e6cceb3c7f87918658c3e2933e254b477b86814446318e32ef49f9f12c94529bc4ed08

    • SSDEEP

      1536:64brI6HqE6rUGJQ+zL93CDxutD7tu5XGXmdyIPM:lbk8qE6rUGi+V3CDYtDsoWXM

    Score
    9/10
    • Contacts a large (145331) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks