General

  • Target

    NEAS.0e461556aea89aa9847292ea3237466bbb32e28ac49108df158d99fd787bace2.elf

  • Size

    45KB

  • Sample

    231111-mr3z5sdg7t

  • MD5

    5e99a34029879a86e255d5c14edf8eab

  • SHA1

    10a7ee09c719143dc6f11b2a879cfd7f9169c8d9

  • SHA256

    0e461556aea89aa9847292ea3237466bbb32e28ac49108df158d99fd787bace2

  • SHA512

    49b453795220a3c4c2ea8f2f3d3872557f3557ae2c98e51bfd9f9fae31a057308bdba496d1d9e0c2bacc6164c2a1932d5ab75c46f761af31194515a46e5565d9

  • SSDEEP

    768:p9T3kFvFsOvIZg3VevqKxpn9m+/8KlUfPoVj//N+WX7JTzLgwi:L3kFvqOv0Q8lgxfW/z91i

Score
10/10

Malware Config

Extracted

Family

mirai

C2

lol.lmanber.fun

Targets

    • Target

      NEAS.0e461556aea89aa9847292ea3237466bbb32e28ac49108df158d99fd787bace2.elf

    • Size

      45KB

    • MD5

      5e99a34029879a86e255d5c14edf8eab

    • SHA1

      10a7ee09c719143dc6f11b2a879cfd7f9169c8d9

    • SHA256

      0e461556aea89aa9847292ea3237466bbb32e28ac49108df158d99fd787bace2

    • SHA512

      49b453795220a3c4c2ea8f2f3d3872557f3557ae2c98e51bfd9f9fae31a057308bdba496d1d9e0c2bacc6164c2a1932d5ab75c46f761af31194515a46e5565d9

    • SSDEEP

      768:p9T3kFvFsOvIZg3VevqKxpn9m+/8KlUfPoVj//N+WX7JTzLgwi:L3kFvqOv0Q8lgxfW/z91i

    Score
    9/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks