General

  • Target

    2e0dc423b6b275c1bef75d70ece28c26.elf

  • Size

    151KB

  • Sample

    230509-sqqw3sce36

  • MD5

    2e0dc423b6b275c1bef75d70ece28c26

  • SHA1

    b05db8c32a21c541eee28336a517bac3e99b00b1

  • SHA256

    c300bcf277d247cc6db37e3aff2b9ca051118d160c8cf34757c28a8fd80a6693

  • SHA512

    9183ec8bfc80238d4907c6105fd4b0f0d9b7428a652b229dcbd8db7f9a87bd326212ba9bd7e64661962ec6414d6e1eb172cd8c8efcf0b7aa8192ff3595f2017a

  • SSDEEP

    3072:WUEAf3ViQGRk737hoarkC72VxRIABtpu1KA6XeYLbM/9qlBf21:WUEAfViLRkT9oarkC72VvIAgYA6XeYvO

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.chipbf.com

Targets

    • Target

      2e0dc423b6b275c1bef75d70ece28c26.elf

    • Size

      151KB

    • MD5

      2e0dc423b6b275c1bef75d70ece28c26

    • SHA1

      b05db8c32a21c541eee28336a517bac3e99b00b1

    • SHA256

      c300bcf277d247cc6db37e3aff2b9ca051118d160c8cf34757c28a8fd80a6693

    • SHA512

      9183ec8bfc80238d4907c6105fd4b0f0d9b7428a652b229dcbd8db7f9a87bd326212ba9bd7e64661962ec6414d6e1eb172cd8c8efcf0b7aa8192ff3595f2017a

    • SSDEEP

      3072:WUEAf3ViQGRk737hoarkC72VxRIABtpu1KA6XeYLbM/9qlBf21:WUEAfViLRkT9oarkC72VvIAgYA6XeYvO

    Score
    9/10
    • Contacts a large (34295) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Reads runtime system information

      Reads data from /proc virtual filesystem.

    • Writes file to tmp directory

      Malware often drops required files in the /tmp directory.

MITRE ATT&CK Enterprise v6

Tasks