General

  • Target

    1bd2e3b41f520681e26fd1382659c1e7

  • Size

    51KB

  • Sample

    231219-2k2wtsahdr

  • MD5

    1bd2e3b41f520681e26fd1382659c1e7

  • SHA1

    0131f88966d9764d77e169c0edf76748671879ab

  • SHA256

    1c9bbca446095338556e337c83243a6e71b334a90f2c52a61a1d834ed73b8696

  • SHA512

    1499c4c7ce1d1a7138226377967f460ea990c85553a9fa36a4fc5610c365ab2c964648fc0154d11f5454029eab39350f565628fa87b79fc677da526d19c28f20

  • SSDEEP

    768:4nnr7aqhmy3ZtWAFV6ardezT8FVUxRMXgvINurPdFTnQYyH2OzNLkGe7uyKBbMUu:g+MO4urdBK2YeCIU6LPltwvtxRnB

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOT

Targets

    • Target

      1bd2e3b41f520681e26fd1382659c1e7

    • Size

      51KB

    • MD5

      1bd2e3b41f520681e26fd1382659c1e7

    • SHA1

      0131f88966d9764d77e169c0edf76748671879ab

    • SHA256

      1c9bbca446095338556e337c83243a6e71b334a90f2c52a61a1d834ed73b8696

    • SHA512

      1499c4c7ce1d1a7138226377967f460ea990c85553a9fa36a4fc5610c365ab2c964648fc0154d11f5454029eab39350f565628fa87b79fc677da526d19c28f20

    • SSDEEP

      768:4nnr7aqhmy3ZtWAFV6ardezT8FVUxRMXgvINurPdFTnQYyH2OzNLkGe7uyKBbMUu:g+MO4urdBK2YeCIU6LPltwvtxRnB

    Score
    9/10
    • Contacts a large (53981) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks