General

  • Target

    27f8efe725fb96c0aeb174a4bcaaa254

  • Size

    61KB

  • Sample

    230216-hkfh2sgc83

  • MD5

    27f8efe725fb96c0aeb174a4bcaaa254

  • SHA1

    ce6efd93ba423a2af8529d05878352dbbb7b5a2f

  • SHA256

    ef0ed2712cc3175cd5ee84f799b50f6a3f7b4cd9147885b578e9a462187fb64d

  • SHA512

    da6456b1f301e1de55dfba91d024b0a5e2455cf46b8093fd87d063321a6db8a45e73408f0e22b43bc0cd1e2f6c03ef4ee612d1cbffaff7d7f1de2ec978216a3e

  • SSDEEP

    1536:Uo2rxJ7IXR4Wg+0bnzezZlzXPCuWgJOLLK++bB32CzXXXXXXXXXXXXXXGVXXXXX/:0rDMXR/glnz09XKuLcG+akCzXXXXXXXc

Malware Config

Extracted

Family

mirai

Botnet

PEDO

C2

cnc.tightass.cc

sss.tightass.cc

Targets

    • Target

      27f8efe725fb96c0aeb174a4bcaaa254

    • Size

      61KB

    • MD5

      27f8efe725fb96c0aeb174a4bcaaa254

    • SHA1

      ce6efd93ba423a2af8529d05878352dbbb7b5a2f

    • SHA256

      ef0ed2712cc3175cd5ee84f799b50f6a3f7b4cd9147885b578e9a462187fb64d

    • SHA512

      da6456b1f301e1de55dfba91d024b0a5e2455cf46b8093fd87d063321a6db8a45e73408f0e22b43bc0cd1e2f6c03ef4ee612d1cbffaff7d7f1de2ec978216a3e

    • SSDEEP

      1536:Uo2rxJ7IXR4Wg+0bnzezZlzXPCuWgJOLLK++bB32CzXXXXXXXXXXXXXXGVXXXXX/:0rDMXR/glnz09XKuLcG+akCzXXXXXXXc

    Score
    9/10
    • Contacts a large (76744) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks