General

  • Target

    2c7d00cacb65fc39c7f81b429c668fa9

  • Size

    68KB

  • Sample

    231219-2sbdvahab6

  • MD5

    2c7d00cacb65fc39c7f81b429c668fa9

  • SHA1

    c38f2ed88b53a4ee41e4ecf8ce395420f367897d

  • SHA256

    fdcdb0ce47802fce665ef0a438b368fc2b6bf3430d174d4aac3ce5c7461223d7

  • SHA512

    db01a1d5560436a556775ec9ac3aa8a8089fac05e68317ccd0f6dd91cfc729e9c6023db74137ef02a716e111375f514cdb87f6b7cae0de6229eb35d6cd8b9949

  • SSDEEP

    1536:NbFk/wOZe+559wf9GzfYNmoUWIz8vTtq9nuAyQFpu3NSFK45:k/waZ559wf9GYcVWIz8vTtCnTy2w3c

Malware Config

Extracted

Family

mirai

Botnet

BOT

Targets

    • Target

      2c7d00cacb65fc39c7f81b429c668fa9

    • Size

      68KB

    • MD5

      2c7d00cacb65fc39c7f81b429c668fa9

    • SHA1

      c38f2ed88b53a4ee41e4ecf8ce395420f367897d

    • SHA256

      fdcdb0ce47802fce665ef0a438b368fc2b6bf3430d174d4aac3ce5c7461223d7

    • SHA512

      db01a1d5560436a556775ec9ac3aa8a8089fac05e68317ccd0f6dd91cfc729e9c6023db74137ef02a716e111375f514cdb87f6b7cae0de6229eb35d6cd8b9949

    • SSDEEP

      1536:NbFk/wOZe+559wf9GzfYNmoUWIz8vTtq9nuAyQFpu3NSFK45:k/waZ559wf9GYcVWIz8vTtCnTy2w3c

    Score
    9/10
    • Contacts a large (203421) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Network Service Discovery

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks