General

  • Target

    a4f171c53530c3b5d073294d29d041fe

  • Size

    83KB

  • Sample

    231220-mq7xpsahgj

  • MD5

    a4f171c53530c3b5d073294d29d041fe

  • SHA1

    eceb95345360ad5858c6e7d915dac7ff961f3770

  • SHA256

    c3c72ba55333973d81d2f2aa469d647fcde8b62e81a51b910e20236814c38a90

  • SHA512

    764da105c079656ab5dc4f07b48d7291c38950d1d805aa61f204c5056c70f718ccf0ef0233fd9fa0fb6fecfe944bec93a59669913b043df867523661ac37c055

  • SSDEEP

    1536:KdXLwrIXwS5s9qvXJw9qLEzRUgtAG0xFcJgv+XvEn4cCJi9oJk:KdsrGsaZHLEzyg4xFcJgv+XsnRYNk

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

APEP

Targets

    • Target

      a4f171c53530c3b5d073294d29d041fe

    • Size

      83KB

    • MD5

      a4f171c53530c3b5d073294d29d041fe

    • SHA1

      eceb95345360ad5858c6e7d915dac7ff961f3770

    • SHA256

      c3c72ba55333973d81d2f2aa469d647fcde8b62e81a51b910e20236814c38a90

    • SHA512

      764da105c079656ab5dc4f07b48d7291c38950d1d805aa61f204c5056c70f718ccf0ef0233fd9fa0fb6fecfe944bec93a59669913b043df867523661ac37c055

    • SSDEEP

      1536:KdXLwrIXwS5s9qvXJw9qLEzRUgtAG0xFcJgv+XvEn4cCJi9oJk:KdsrGsaZHLEzyg4xFcJgv+XsnRYNk

    Score
    6/10
    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks