General

  • Target

    588-1-0x0000000008048000-0x0000000008062e00-memory.dmp

  • Size

    96KB

  • Sample

    230703-f2njwaga8z

  • MD5

    0aa1bd913457d5fdad0f77c6a7396dc5

  • SHA1

    86670992a0aeeeb3f1c0541b6a618857cfce5809

  • SHA256

    ffbf2661c3e52e2255f21d90a79b7ea5487d1bee5f62a9acb22bb2ce86dcdd3e

  • SHA512

    7cda88557f5cbbe14d29a7d429a34097623484e12ca85064eadc3f2364b0a512607f1d5c587eba8101c3af88da758ccb449d0a6c0d32c781c9bce5ecfe6f3c4b

  • SSDEEP

    3072:088NimXbdys1IqueknrV63kFh5DjOCQgRSWEN/3zG9wqx1r9H:08CiKbd/uqu/rVckFh5D9QAQvYpH

Malware Config

Extracted

Family

mirai

Botnet

YOWAI

Targets

    • Target

      588-1-0x0000000008048000-0x0000000008062e00-memory.dmp

    • Size

      96KB

    • MD5

      0aa1bd913457d5fdad0f77c6a7396dc5

    • SHA1

      86670992a0aeeeb3f1c0541b6a618857cfce5809

    • SHA256

      ffbf2661c3e52e2255f21d90a79b7ea5487d1bee5f62a9acb22bb2ce86dcdd3e

    • SHA512

      7cda88557f5cbbe14d29a7d429a34097623484e12ca85064eadc3f2364b0a512607f1d5c587eba8101c3af88da758ccb449d0a6c0d32c781c9bce5ecfe6f3c4b

    • SSDEEP

      3072:088NimXbdys1IqueknrV63kFh5DjOCQgRSWEN/3zG9wqx1r9H:08CiKbd/uqu/rVckFh5D9QAQvYpH

    Score
    9/10
    • Contacts a large (20602) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v6

Tasks