General

  • Target

    67cee32affee2a87263a0a4fa90f89d9

  • Size

    127KB

  • Sample

    231219-3f4qasafa2

  • MD5

    67cee32affee2a87263a0a4fa90f89d9

  • SHA1

    0f5c518c258a71b79ce622fa3926822a898e3bdc

  • SHA256

    c4ba1afc647e69cb4c46ed9fd59c0df029cb24ac2318746489025cb42bdab889

  • SHA512

    89d68467dcc879fa0ff18676551dca7ba23b56eb33128c1ca326f13973e9a4093d6b5df30e3198b0495f18e102e694df2607d347d570b5f42d027e3ae3c9a55c

  • SSDEEP

    3072:p5ha/R7XtaQvZVCPgaCYMT8ZisGmrfBM/9xE+:p5hm7taQvZVCP7CoQsGmrZM/9xE+

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOT

Targets

    • Target

      67cee32affee2a87263a0a4fa90f89d9

    • Size

      127KB

    • MD5

      67cee32affee2a87263a0a4fa90f89d9

    • SHA1

      0f5c518c258a71b79ce622fa3926822a898e3bdc

    • SHA256

      c4ba1afc647e69cb4c46ed9fd59c0df029cb24ac2318746489025cb42bdab889

    • SHA512

      89d68467dcc879fa0ff18676551dca7ba23b56eb33128c1ca326f13973e9a4093d6b5df30e3198b0495f18e102e694df2607d347d570b5f42d027e3ae3c9a55c

    • SSDEEP

      3072:p5ha/R7XtaQvZVCPgaCYMT8ZisGmrfBM/9xE+:p5hm7taQvZVCP7CoQsGmrZM/9xE+

    Score
    9/10
    • Contacts a large (53255) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks