General

  • Target

    377b7db1fa9aff155a78cd5e8e6e5b7a.bin

  • Size

    41KB

  • Sample

    230425-bldmhshd9x

  • MD5

    02acf2e82db70333ecfdb7b8e259a7a1

  • SHA1

    513206836334e1272e7359eaac377053371f932b

  • SHA256

    f90ff55b58f025e04449e6fdce6fd2f9cd106df4daa75e66eaa50e648f87b53d

  • SHA512

    38ef5488aab6112bc9ac21d6287a204d383912e952f3e4d14a468be957764b82898938661feae2efc0acfa960f849f2a81a209e2e2b0736dc49a3330fed9078c

  • SSDEEP

    768:/wZrtloDrX0nG7l7wUoUzfjsmriHCnQNREZoxJzGNvA+L7wW0i:4ZrtloDrEnclEUoUzfjBWCQ5xBGVA+wK

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

YAKUZA

Targets

    • Target

      9e9a6e15eb25cc74c18d6c848de9190f676d98b6a14f1d656507e9cbda093928.elf

    • Size

      103KB

    • MD5

      377b7db1fa9aff155a78cd5e8e6e5b7a

    • SHA1

      02c06185e8bb91072ac417c6eb493b7f7da7c130

    • SHA256

      9e9a6e15eb25cc74c18d6c848de9190f676d98b6a14f1d656507e9cbda093928

    • SHA512

      463e7f00d75507963aa60a97329512014a7302172ee81a9d744be3c18d374d871b3a7a79464ff63dd65517ae3fcb3b6c8a1ba57e179eb76d1d9ddc6828be624b

    • SSDEEP

      1536:K+l7BEWafEMu2oxot2QX/B+dVRP0QoShUw2M:KWdMlGV9pv2M

    Score
    5/10
    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Matrix

Tasks