General

  • Target

    a21e450e5a721b96eb3152f8e39ab97a

  • Size

    106KB

  • Sample

    231220-mecmeshgal

  • MD5

    a21e450e5a721b96eb3152f8e39ab97a

  • SHA1

    2d57346103672975e3c179543dde34e2c811d851

  • SHA256

    0f043c61bf0067bb70e39234b1d82fe345afa63fcfb702563efdc068182a6422

  • SHA512

    c66095d26d23811d0ab1c9524a0b925e42f74c63f74c8744234ce948145c4bbab7e3fbab23703afa18370b38bd0273fdd0920f1bfd0e8f3f54d68aa77aeca960

  • SSDEEP

    3072:KsWtuuXhCdYPNo2UEFDGQF8+fj4zM/928:KsWtuuRFPNo2UEFGkfjEM/928

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LARRY

C2

k.silynigr.xyz

f.silynigr.xyz

Targets

    • Target

      a21e450e5a721b96eb3152f8e39ab97a

    • Size

      106KB

    • MD5

      a21e450e5a721b96eb3152f8e39ab97a

    • SHA1

      2d57346103672975e3c179543dde34e2c811d851

    • SHA256

      0f043c61bf0067bb70e39234b1d82fe345afa63fcfb702563efdc068182a6422

    • SHA512

      c66095d26d23811d0ab1c9524a0b925e42f74c63f74c8744234ce948145c4bbab7e3fbab23703afa18370b38bd0273fdd0920f1bfd0e8f3f54d68aa77aeca960

    • SSDEEP

      3072:KsWtuuXhCdYPNo2UEFDGQF8+fj4zM/928:KsWtuuRFPNo2UEFGkfjEM/928

    Score
    9/10
    • Contacts a large (53979) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks