General

  • Target

    756d97406377af8fdc91c66281f0d145.elf

  • Size

    82KB

  • Sample

    230612-hlchsaah55

  • MD5

    756d97406377af8fdc91c66281f0d145

  • SHA1

    e2144899d360bf898b8df0431bb5973aacee16d5

  • SHA256

    e9992feb2c467626f7780b63e31cc93c86d2896f028b94768a1677d7d69de7e6

  • SHA512

    fb0cc711fa99bab3f56616d18900873173085762dafe624a7c4032b21fc369f9231da1970e8dc6bf0ff7d5749be4102bf314b5c5755d70d13eb0de87a8245da7

  • SSDEEP

    1536:iVLymx1KxRkj752dCexuV/8UZlDwfkJ4MYfWv:iVLyIUGFezxu5VD1e6

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.nguyennghi.info

Targets

    • Target

      756d97406377af8fdc91c66281f0d145.elf

    • Size

      82KB

    • MD5

      756d97406377af8fdc91c66281f0d145

    • SHA1

      e2144899d360bf898b8df0431bb5973aacee16d5

    • SHA256

      e9992feb2c467626f7780b63e31cc93c86d2896f028b94768a1677d7d69de7e6

    • SHA512

      fb0cc711fa99bab3f56616d18900873173085762dafe624a7c4032b21fc369f9231da1970e8dc6bf0ff7d5749be4102bf314b5c5755d70d13eb0de87a8245da7

    • SSDEEP

      1536:iVLymx1KxRkj752dCexuV/8UZlDwfkJ4MYfWv:iVLyIUGFezxu5VD1e6

    Score
    9/10
    • Contacts a large (34555) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v6

Tasks