General

  • Target

    arm.elf

  • Size

    45KB

  • Sample

    231107-x4cntsec5z

  • MD5

    49a0ed0974f4c5c299030277953398e3

  • SHA1

    3c0879e09c680af9cfddde08377cc1a0e4a51aa6

  • SHA256

    091def7e72bd534e78b504818ab3582b67e6ecbf072008dad620d99590a95231

  • SHA512

    e2d93709f7ee1cc705d5cfb66b61d0225e2638553fcd78b59325a206ceab222254a5fa7e8d49b9d4b3d3eaa3ca33dd879c9392b3e6f2172ffc765a69ddb314a9

  • SSDEEP

    768:hRT38FvJsOvEZU3JyvqKVtn9K6/8axU/PoVW3/N+WzHn533LEw:P38Fv+Ovo089wl/z3XBh

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.ngocronglau.xyz

Targets

    • Target

      arm.elf

    • Size

      45KB

    • MD5

      49a0ed0974f4c5c299030277953398e3

    • SHA1

      3c0879e09c680af9cfddde08377cc1a0e4a51aa6

    • SHA256

      091def7e72bd534e78b504818ab3582b67e6ecbf072008dad620d99590a95231

    • SHA512

      e2d93709f7ee1cc705d5cfb66b61d0225e2638553fcd78b59325a206ceab222254a5fa7e8d49b9d4b3d3eaa3ca33dd879c9392b3e6f2172ffc765a69ddb314a9

    • SSDEEP

      768:hRT38FvJsOvEZU3JyvqKVtn9K6/8axU/PoVW3/N+WzHn533LEw:P38Fv+Ovo089wl/z3XBh

    Score
    7/10
    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks