General

  • Target

    46686fe6d6788982a78dcda64439f035

  • Size

    102KB

  • Sample

    231219-231rgsabbl

  • MD5

    46686fe6d6788982a78dcda64439f035

  • SHA1

    0983dae91c88237217adf3c0f4443b1600aefd3b

  • SHA256

    db9ad647a8f3957e5a551f0e0e05a9434b71abeee82f04dc31cb142adce0a87c

  • SHA512

    bfd0d1ee1d64eac2c48afa9b00ab1ea9780fd6746592476557d11561189bcaee47f9f86532774c46ca69b64de793aa1e5de9cf2245a0b6643d7e4478357897cc

  • SSDEEP

    1536:lTYqgK5rDqDXi9mnb5lQV6mAQ9UTt7qB5Z3RC1klx:lhgqrDqDXckliuqB5

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

OSIRIS

Targets

    • Target

      46686fe6d6788982a78dcda64439f035

    • Size

      102KB

    • MD5

      46686fe6d6788982a78dcda64439f035

    • SHA1

      0983dae91c88237217adf3c0f4443b1600aefd3b

    • SHA256

      db9ad647a8f3957e5a551f0e0e05a9434b71abeee82f04dc31cb142adce0a87c

    • SHA512

      bfd0d1ee1d64eac2c48afa9b00ab1ea9780fd6746592476557d11561189bcaee47f9f86532774c46ca69b64de793aa1e5de9cf2245a0b6643d7e4478357897cc

    • SSDEEP

      1536:lTYqgK5rDqDXi9mnb5lQV6mAQ9UTt7qB5Z3RC1klx:lhgqrDqDXckliuqB5

    Score
    6/10
    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.