General

  • Target

    revers_met.elf

  • Size

    250B

  • Sample

    230728-s4rqjaef2z

  • MD5

    cc0cad9f4578cd48adb3f7cd925f1d4d

  • SHA1

    ba18c820e3e22c1c0fe0cd652292342dcb7c5638

  • SHA256

    b7d17097a334a02f1336771bfb93b1c2f455ef20147aada4683673dce981e1fd

  • SHA512

    87f62c659e7e4b362713c6ad30d267941889c37d638c09824fbe523756ee67eb6872edbb806422ba349774192cc93423a1b4beb4ea319f6a77b3701cb2b83f5d

Score
10/10

Malware Config

Extracted

Family

connectback

C2

51.15.18.85:53

Targets

    • Target

      revers_met.elf

    • Size

      250B

    • MD5

      cc0cad9f4578cd48adb3f7cd925f1d4d

    • SHA1

      ba18c820e3e22c1c0fe0cd652292342dcb7c5638

    • SHA256

      b7d17097a334a02f1336771bfb93b1c2f455ef20147aada4683673dce981e1fd

    • SHA512

      87f62c659e7e4b362713c6ad30d267941889c37d638c09824fbe523756ee67eb6872edbb806422ba349774192cc93423a1b4beb4ea319f6a77b3701cb2b83f5d

    Score
    7/10
    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix

Tasks