General

  • Target

    5d0a1c93f0f920bbfe02e6e5070c3c69.bin

  • Size

    21KB

  • Sample

    231127-ccry8adf3x

  • MD5

    cc9c20bdd9a3ab5c17f4424b52e8c9da

  • SHA1

    de05dc0d014b8e961a848ab7e6546ec377866bb9

  • SHA256

    27f4b7db9fa90306ec27d314c0ee39a022e0b0b154e7934b0cc3a06ee5615502

  • SHA512

    6afde3ba6118b787103bc2cea65e346c01748dccc516f87a0bec0bd1e85a4fdd3ffb23fb0b14f37f3fd13cebacb00c772e7df541cc324b534502aedd8bc62866

  • SSDEEP

    384:rixhU7uH9izgImFjAc3bw4HZvsanpjKPKVpWY1UwTgryb8llO+SxnQBDc39Mm15H:GbX9ipm2c845kaIa4yMODxn4iMYz4Ik6

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet2.psscc.cn

Targets

    • Target

      a081a5d0043fc43aa425498cb4471f866c281edd42ea6f2da092e8212c1e1f94.elf

    • Size

      45KB

    • MD5

      5d0a1c93f0f920bbfe02e6e5070c3c69

    • SHA1

      ef6948a44b00fb2cd46af6ed592aa9efc6106c65

    • SHA256

      a081a5d0043fc43aa425498cb4471f866c281edd42ea6f2da092e8212c1e1f94

    • SHA512

      ab488dca2140b7020a29639da54a5ff07095d9c887e9403e5d10c79feb16ebed29128491ffccfad04ee265f594443cfe108500eaa28d17c08b34d28f0b3883b6

    • SSDEEP

      768:p9T3kFvFsOvIZg3VevqKxpn9m+/8KlUfPoVs//N+WX7JTzLgwo:L3kFvqOv0Q8lgxfF/z91o

    Score
    7/10
    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks