General

  • Target

    890ba1b1a726fbd888e7be7335eeedf0

  • Size

    157KB

  • Sample

    231220-ghjx1shfd2

  • MD5

    890ba1b1a726fbd888e7be7335eeedf0

  • SHA1

    09a02537ccaa6fa13a2be6259051e9b4a9abde8d

  • SHA256

    80de61cebeb6610da292600b089c0de0acce936a5b983699be8fd49d4795320e

  • SHA512

    b3cd1047a52814037ed65c4eeba361b1c2e04a1ba3e83075792975b73289ec9c3621f3ca32a621a17f4bc2fe36ab78805543e02d7d5deb6bea4d27a7b245d2b9

  • SSDEEP

    3072:uZpP8/qM2UHRYgt+eyiH8LSaliyEOd0QRRrMMh02u+8klM/9hMq7Cp:0pP8/5RnRHASaliyEOdbRjNu+8WM/9ip

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOT

Targets

    • Target

      890ba1b1a726fbd888e7be7335eeedf0

    • Size

      157KB

    • MD5

      890ba1b1a726fbd888e7be7335eeedf0

    • SHA1

      09a02537ccaa6fa13a2be6259051e9b4a9abde8d

    • SHA256

      80de61cebeb6610da292600b089c0de0acce936a5b983699be8fd49d4795320e

    • SHA512

      b3cd1047a52814037ed65c4eeba361b1c2e04a1ba3e83075792975b73289ec9c3621f3ca32a621a17f4bc2fe36ab78805543e02d7d5deb6bea4d27a7b245d2b9

    • SSDEEP

      3072:uZpP8/qM2UHRYgt+eyiH8LSaliyEOd0QRRrMMh02u+8klM/9hMq7Cp:0pP8/5RnRHASaliyEOdbRjNu+8WM/9ip

    Score
    9/10
    • Contacts a large (386307) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks